acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Google Pushes 2D Barcodes
From The Eponymous Pickle

Google Pushes 2D Barcodes

From Storefrontbacktalk: ' ... This week, Google said it was trying to breathe life into these barcodes by mailing 200,000 2D barcode stickers to small businesses...

Australia Restores Some Sanity to Airport Screening
From Schneier on Security

Australia Restores Some Sanity to Airport Screening

Welcome news: Carry-on baggage rules will be relaxed under a shake-up of aviation security announced by the Federal Government today. The changes will see passengers...

The challenge of co-production
From Putting People First

The challenge of co-production

A new discussion paper by NESTA, the UK’s National Endowment for Science, Technology and the Arts, argues that the key to reforming public services is to encourage...

Kroger Links Loyalty to Wireless Minutes
From The Eponymous Pickle

Kroger Links Loyalty to Wireless Minutes

Retailers are starting to do more clever things with loyalty programs: ' ... The Kroger Co. is rolling out what it says is a first-of-its-kind loyalty program that...

The Politics of Power in Cyberspace
From Schneier on Security

The Politics of Power in Cyberspace

Thoughful blog post by The Atlantic's Marc Ainbinder: We allow Google, Amazon.com, credit companies and all manner of private corporations to collect intimateMy...

From Computational Complexity

A hard problem inspired by an easy problem

The following problem was problem 1 (the easy one) on the Maryland Math Competition 2009 (I will later report on how the students did on it). Show that for every...

Entropy-efficient Computing
From Daniel Lemire's Blog

Entropy-efficient Computing

Microprocessors and storage devices are subject to the second law of thermodynamics: using them turn usable energy (oil, hydrogen) into unusable energy (heat).

? Settled but not cured
From Wild WebMink

? Settled but not cured

Q&A: Microsoft's top lawyer on European case, future of antitrust Well worth reading to understand Microsoft's world-view. Sadly...

Mag+, a concept video on the future of digital magazines
From Putting People First

Mag+, a concept video on the future of digital magazines

Bonnier R&D, the research unit of Bonnier, the publisher of Popular Science, invited the designers from BERG London on a corporate collaborative research project...

Ubiquitous computing bridges devices and services
From Putting People First

Ubiquitous computing bridges devices and services

Mike Kuniavsky of ThingM was a speaker at XD Forum, Intuit’s internal user experience design conference, last week. His half-hour talk focused on the relationship...

New at Junaio
From The Eponymous Pickle

New at Junaio

I recently mentioned Junaio and its IPhone App. A good example of the current state of 'augmented reality', as the term suggests its a means of adding useful information...

Ray Kurzweil's Future
From The Eponymous Pickle

Ray Kurzweil's Future

Ray Kurzweil, noted technologist and futurist, predicts how technology will change us by 2020.-

Programming Challenge 4 Girls (PC4G) Event in New Zealand
From Computer Science Teachers Association

Programming Challenge 4 Girls (PC4G) Event in New Zealand

In November this year, a series of challenges using Alice was held at 4 venues around New Zealand. The events were staggered as the days were planned so that a...

Avoiding Travel
From My Biased Coin

Avoiding Travel

I'm spending the morning as part of the committee for a thesis defense over in Europe. I'm watching the talk over Skype; we're using a conference call for sound...

Coupon Chief
From The Eponymous Pickle

Coupon Chief

I recently got a note from Couponchief.com, which lets you search for coupons for online purchase. They write: ' ... Coupon Chief is one of the fastest growing....

Facial Recognition Door Lock
From Schneier on Security

Facial Recognition Door Lock

Only $456.

Technical Guidelines Development Committee Meets After Two Year Hiatus
From U.S. Public Policy Committee of the ACM

Technical Guidelines Development Committee Meets After Two Year Hiatus

The Technical Guidelines Development Committee (TGDC), responsible to the Election Assistance Commission (EAC) for the drafting guidance for voting system standards...

Guest Post- Women in Theory Workshop
From Computational Complexity

Guest Post- Women in Theory Workshop

(Tal Rabin requested to post this so I am doing so. This post is essentially her email, so call it a guest post.)   There will be a Women In Theory workshop for...

Strategies for Lighting the Fire for Learning
From The Female Perspective of Computer Science

Strategies for Lighting the Fire for Learning

On December 4, I attended a public presentation that was put on for the Seminar in University Teaching, a graduate course at Carleton. Popular psychology professor...

Telcoms Security
From Schneier on Security

Telcoms Security

A very good four-part series: "Risk and Security in the Telecommunications Industry."
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account