acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Semantic Communication, Madhu Sudan
From My Biased Coin

Semantic Communication, Madhu Sudan

Madhu Sudan gave a colloquium at Harvard yesterday on his work on Universal Semantic Communication and Goal-Oriented Communication (both with Brendan Juba, thehere...

Touchpoint Issue 2
From Putting People First

Touchpoint Issue 2

The second issue of Touchpoint, the sdn’s Service Design Journal, is out. Entitled “Health and Service Design”, this brand-new issue features articles of Service...

Informing Communities: Sustaining Democracy in the Digital Age
From Apophenia

Informing Communities: Sustaining Democracy in the Digital Age

Over the last 18 months, I have had the great honor of serving as a Commissioner on the Knight Commission on the Information Needs of Communities. Today, it gives...

Truth In Labelling
From Wild WebMink

Truth In Labelling

  When I wrote about Organic Software recently, I was largely eulogising the community dimension of open source software. But there's another way in which theThe...

Proving a Computer Program's Correctness
From Schneier on Security

Proving a Computer Program's Correctness

This is interesting: Professor Gernot Heiser, the John Lions Chair in Computer Science in the School of Computer Science and Engineering and a senior principal...

Open Innovation
From The Eponymous Pickle

Open Innovation

A guide to implementing open innovation. ' ... The report,

A Simplified Open Publishing Manifesto
From Daniel Lemire's Blog

A Simplified Open Publishing Manifesto

Bill Gasarch is proposing a manifesto on Open Scholarship. What a great idea! Imagine thousands of researchers openly agreeing on practices making research more...

From Computational Complexity

The Journal Manifesto 2.0

Reminder: FOCS early registration deadline today. Go here Below is a revised version of the Journal Manifesto. I restate the key sentence from my last post and...

Guest Post: A Plan For Abusiveness
From The Noisy Channel

Guest Post: A Plan For Abusiveness


links for 2009-10-01
From Wild WebMink

links for 2009-10-01

Cottage sale omits nuclear view Calling certain software "open source" is like the people selling this fisherman's cottage calling...

Cart Device at Bloom
From The Eponymous Pickle

Cart Device at Bloom

Cart mounted shopping devices continue to be tested. Here again the Concierge device, previously reported on here, is in limited time test at Food Lion's Bloom'...

GPU News
From My Biased Coin

GPU News

Since I've now co-authored a paper on GPUs, I'm now "in-the-loop" (thanks to my co-author John Owens) on the news of NVIDIA's announcement of its "next generation"...

Justice!
From My Biased Coin

Justice!

Harvard is putting the lectures (and other materials) online for a fantastic course, Justice, taught by Michael Sandel. It's a class on moral reasoning, exactly...

Nice Use of Diversion During a Robbery
From Schneier on Security

Nice Use of Diversion During a Robbery

During a daring bank robbery in Sweden that involved a helicopter, the criminals disabled a police helicopter by placing a package with the word "bomb" near the...

FaceCard Application
From The Eponymous Pickle

FaceCard Application

Facecard: A PayPal like third part Facebook application that allows the transferral of funds. Intrigued by its possible use for non-profit donation work. Does...

The user experience of smart phones
From Putting People First

The user experience of smart phones

Several articles on the smart phone user experience: Getting emotional about mobile phones A nationwide study of over 3000 people has found that there is a direct...

Google Updates Search Refinement Options
From The Noisy Channel

Google Updates Search Refinement Options


Reproducing Keys from Photographs
From Schneier on Security

Reproducing Keys from Photographs

Reproducing keys from distant and angled photographs: Abstract:The access control provided by a physical lock is based on the assumption that the information content...

Google Wave Threaten Social Networks?
From The Eponymous Pickle

Google Wave Threaten Social Networks?

Will Google Wave </">threaten Facebook and Twitter?-

RFID Improving Inventory Accuracy
From The Eponymous Pickle

RFID Improving Inventory Accuracy

It is what we ultimately expected from RFID tagging: a better understanding what you have and where. That would lead to less out-of-stocks and less over-ordering...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account