acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Obama's Cybersecurity Czar
From Schneier on Security

Obama's Cybersecurity Czar

Rumors are that RSA president Art Coviello declined the job. No surprise: it has no actual authority but a lot of responsibility. Security experts have pointed...

? Digging Below The Superficial Gloss
From Wild WebMink

? Digging Below The Superficial Gloss

Patent Protection For Sale "If you think patents protect plucky innovators and their groundbreaking inventions, you haven't been...

From Computational Complexity

A Blog Sabbatical

With the end of the fall quarter I will take a break from the blog for a few months. This is not another End, just a chance to move my creative juices in another...

Augmented Reality is overhyped and abused
From Putting People First

Augmented Reality is overhyped and abused

Augmented Reality is overhyped and abused, writes Matthew Szymczyk in Advertising Age, and we’re in danger of killing off a rather useful technology. “As web-based...

User-centred design for energy efficiency in buildings
From Putting People First

User-centred design for energy efficiency in buildings

The UK’s Technology Strategy Board is calling for individuals to take part in a five-day interactive workshop (

News Items
From My Biased Coin

News Items

The people at Microsoft Research New England are excited to announce that Boaz Barak will be joining them. I imagine the situation is similar to their hiring of...

The Power of Your Listing in ...
From The Eponymous Pickle

The Power of Your Listing in ...

What happens when your site disappears from Google. And who do you complain to?

From Apophenia


Fiscal Year 2010 Budget Almost Done; Science Agencies See Modest Gains
From U.S. Public Policy Committee of the ACM

Fiscal Year 2010 Budget Almost Done; Science Agencies See Modest Gains

Peter Harsha at the Computing Research Association has the specifics at the CRA Government Affairs Blog. In the current conference agreement most of the science...

Reacting to Security Vulnerabilities
From Schneier on Security

Reacting to Security Vulnerabilities

Last month, researchers found a security flaw in the SSL protocol, which is used to protect sensitive web data. The protocol is used for online commerce, webmail...

From Computational Complexity

Whats your Game Mr. Bond? Nim?

BILL: Clyde is teaching a graduate course titled Games, Game Theory, and the Theory of Games. He tells me that there are basically eight kinds of games governed...

Microsoft social media researcher Danah Boyd in the news
From Putting People First

Microsoft social media researcher Danah Boyd in the news

Danah Boyd, a social media researcher at Microsoft Research, is quite in the news these days, including a very nice profile in The Guardian: The Guardian – 9 December...

Gimmicky Augmented Reality
From The Eponymous Pickle

Gimmicky Augmented Reality

Useful AdAge piece on gimmicks and hyping augmented reality. The suggestions are useful. Though gimmicks can be useful in positioning the possibility of an emergent...

New Folds
From The Eponymous Pickle

New Folds

A description in New Scientist of a new way of mapping the spherical earth into flat projections. I have seen a number of examples of similar methods. They are...

When Technicalities Interfere with Learning
From Computer Science Teachers Association

When Technicalities Interfere with Learning

I was observing a middle school computer science class the other day working on a 3D graphics project. The teacher was describing how to define colors using the...

Faceted Search Presentation at New York CTO Club
From The Noisy Channel

Faceted Search Presentation at New York CTO Club


TSA Publishes Standard Operating Procedures
From Schneier on Security

TSA Publishes Standard Operating Procedures

BoingBoing is pretty snarky: The TSA has published a "redacted" version of their s00per s33kr1t screening procedure guidelines (Want to know whether to frisk a...

links for 2009-12-10
From Wild WebMink

links for 2009-12-10

Giant Mysterious Spiral Takes Over the Skies of Norway UFO vapour trail? Northern Lights caught in spin cycle? Giant hoax (and...

The other side of the table: Ben Collins-Sussman
From Return 42;

The other side of the table: Ben Collins-Sussman

This is already the 13th installment of The other side of the table. To me, it is still amazing how many people took the time to reply to my inquiry about their...

Latest Donald Norman essay started a big debate
From Putting People First

Latest Donald Norman essay started a big debate

Donald Norman ’s recent essay Technology First, Needs Last, in which he argues that “design research is great when it comes to improving existing product categories...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account