acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

IBM Crowdsourcing
From The Eponymous Pickle

IBM Crowdsourcing

An instructive piece on how IBM sources skills to a job. Requires registration. -

Learning with Serious Games
From The Eponymous Pickle

Learning with Serious Games

On learning through games and simulations. ' ... Karl Kapp, professor, author and speaker, understands the value of games and simulations in learning. In this...

Drawing as Thinking
From The Eponymous Pickle

Drawing as Thinking

David Sibbet passes along a link to a video by Milton Glaser on drawing as another form of thinking.

From Computational Complexity

Birthday Paradox Variance

First a message from David Johnson for proposals on locations for SODA 2012 both in and outside the US. Here's an interesting approach to the birthday paradox...

Embracing an Innovation
From The Eponymous Pickle

Embracing an Innovation

A timely piece in Knowledge@Wharton on choosing innovations. Something we and all enterprises struggled with under the topic of knowledge management and portfolio...

Virtual Mafia in Online Worlds
From Schneier on Security

Virtual Mafia in Online Worlds

If you allow players in an online world to penalize each other, you open the door to extortion: One of the features that supported user socialization in the game...

links for 2009-11-25
From Wild WebMink

links for 2009-11-25

Senators press EU to speed its Oracle-Sun probe US senators, that is. I'm sure the Commission will completely ignore them. (tags: Sun Oracle...

fMRI used in Sentencing
From The Eponymous Pickle

fMRI used in Sentencing

Having just personally experienced my first fMRI, this caught my eye. Apparently the first time that this has been done in a courtroom. Not that the method is being...

Real Code is Messy
From Computer Science Teachers Association

Real Code is Messy

Reading John Harrison's blog of November 3 got me thinking about what I am trying to teach my students in my third-semester (university) course about the development...

Users Rationally Rejecting Security Advice
From Schneier on Security

Users Rationally Rejecting Security Advice

This paper, by Cormac Herley at Microsoft Research, sounds like me: Abstract: It is often suggested that users are hopelessly lazy and unmotivated on securityme...

Run-length encoding (part I)
From Daniel Lemire's Blog

Run-length encoding (part I)

Run-length encoding (RLE) is probably the most important and fundamental string compression technique. Countless multimedia formats and protocols use one form or...

An Extra Piece of Chicken
From The Eponymous Pickle

An Extra Piece of Chicken

I see that Marco Marsan has set up a new site and blog for Marco Polo, his strategic innovation company. So what is this about chicken? See his great story about...

From Computational Complexity

DIMACS at 20

Last Friday DIMACS celebrated its 20th anniversary. Muthu summarizes the event. DIMACS has served the theoretical computer science community well over these two...

4-Year Masters
From My Biased Coin

4-Year Masters

Harvard, like many other places, has an option by which students (with "Advanced Standing" from AP classes) can obtain a Master's (in some programs) as well as...

Spectacle at Web2.0 Expo... From my Perspective
From Apophenia

Spectacle at Web2.0 Expo... From my Perspective

Last week, I gave a talk at Web2.0 Expo. From my perspective, I did a dreadful job at delivering my message. Yet, the context around my talk sparked a broad conversation...

Norbt
From Schneier on Security

Norbt

Norbt (no robot) is a low-security web application to encrypt web pages. You can create and encrypt a webpage. The key is an answer to a question; anyone who...

links for 2009-11-24
From Wild WebMink

links for 2009-11-24

Capitalism's Fundamental Flaw From Forbes, no less: "In 2009, 30 million people sit unemployed in America. Yet, the speculators have managed to...

IKEA and Facebook
From The Eponymous Pickle

IKEA and Facebook

IKEA uses facebook tagging to promote creative new store opening.-

Decertifying "Terrorist" Pilots
From Schneier on Security

Decertifying "Terrorist" Pilots

This article reads like something written by the company's PR team. When it comes to sleuthing these days, knowing your way within a database is as valued a skill...

L'Oreal Case Study on Mobility
From The Eponymous Pickle

L'Oreal Case Study on Mobility

I see that Consumer Goods Technology will be presenting a webinar tomorrow: The Booming Value of Mobility - In the Enterprise and Beyond. L'Oreal will be among...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account