acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

Complexity Vidcast 2

Bill and I battle it out over what should be taught in a complexity course in our new vidcast.  

1,000 Cybersecurity Experts
From Schneier on Security

1,000 Cybersecurity Experts

Yesterday, DHS Secretary Janet Napolitano said that the U.S. needed to hire 1,000 cybersecurity experts over the next three years. Bob Cringly doubts that there...

Inside user research at YouTube
From Putting People First

Inside user research at YouTube

User experience researcher Sasha Lubomirsky talks about his work at YouTube: “If you think about watching a video online, it may seem pretty easy. A player, a play...

The city as an interaction platform
From Putting People First

The city as an interaction platform

Martijn de Waal was at the Picnic 2009 conference in Amsterdam, where he attended the session entitled “The City as an Interaction Platform”: Cities have always...

Smarter Ads for Phones
From The Eponymous Pickle

Smarter Ads for Phones

In E-Commerce Times. Google had developed a new piece of code for phones with HTTP browsers to allow the display of advanced ads on mobile platforms. Mobile capabilities...

Toward an integrated approach to product strategy and design
From Putting People First

Toward an integrated approach to product strategy and design

San Francisco-based user experience consultancy Montparnas started a three-part series on the relationship between product development and user experience design...

links for 2009-10-09
From Wild WebMink

links for 2009-10-09

The Foundations of Openness Very interesting paper from none other than Pia Waugh on the subject of constructing a software freedom...

PCing
From My Biased Coin

PCing

This week I got my batches of papers to review for NSDI and LATIN. If I'm quiet for a while, I'm busy reading (and writing reviews). Needless to say, I didn't...

The Futility of Defending the Targets
From Schneier on Security

The Futility of Defending the Targets

This is just silly: Beaver Stadium is a terrorist target. It is most likely the No. 1 target in the region. As such, it deserves security measures commensurate...

SASCom on Retail
From The Eponymous Pickle

SASCom on Retail

Sascom Magazine reports on learnngs ' ... Last week at the SAS Retail Executive Seminar held in Cary, NC ... was able to catch up with industry leaders and ask...

Building a Scorecard for Open Source
From Wild WebMink

Building a Scorecard for Open Source

In my previous posts, I've drawn an analogy between open source software and organic food, hinting that in both cases the rush to create a working brand lost some...

Procter Plans Beauty Magazine
From The Eponymous Pickle

Procter Plans Beauty Magazine

P&G to Launch Custom Beauty Magazine Rouge in U.S.: Package Goods Giant Plans to Build Database by Relying on Mommy Bloggers to Spread the Word. Nice to see bloggers...

Starbucks M-Commerce for IPhone
From The Eponymous Pickle

Starbucks M-Commerce for IPhone

A case study of the use of M-Commerce by Starbucks in Storefrontbacktalk. I agree with their comments, I have tried a half dozen M-commerce applications, but have...

From Computational Complexity

Publicity for P versus NP

On the New York Times website, John Markoff writes an article Prizes Aside, the P-NP Puzzler has Consequences motivated by my CACM article on The Status of the....

ACM Washington Update, Vol. 13.8 (October 8, 2009)
From U.S. Public Policy Committee of the ACM

ACM Washington Update, Vol. 13.8 (October 8, 2009)

CONTENTS [1] Newsletter Highlights [2] ACM Argues for Computer Science Education in Kansas [3] FCC Chairman Plans to Create Net Neutrality Rules [4] House Committee...

Fujitsu Rugged RFID
From The Eponymous Pickle

Fujitsu Rugged RFID

Fujitsu has announced that it has developed a more rugged RFID chip. Based on some of my own recent discussions there are a number of useful applications, for example...

Is Twitter Planning To Monetize The Firehose?
From The Noisy Channel

Is Twitter Planning To Monetize The Firehose?


P vs NP Reviewed by Times
From The Eponymous Pickle

P vs NP Reviewed by Times

I mentioned this article some time ago, it was orginally in the Communications of the ACM, about one of the most difficult yet practical mathematical problems of...

See Search Results as PDF
From The Eponymous Pickle

See Search Results as PDF

In what seems like a small thing, Google now lets you get a quick view of search results, Gmail and Google docs as a PDF. As a result you can preserve more formatting...

Detecting Forged Signatures Using Pen Pressure and Angle
From Schneier on Security

Detecting Forged Signatures Using Pen Pressure and Angle

Interesting: Songhua Xu presented an interesting idea for measuring pen angle and pressure to present beautiful flower-like visual versions of a handwritten signature...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account