acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

IPhone as a Security Camera
From The Eponymous Pickle

IPhone as a Security Camera

A $1.99 IPhone App called IP Camera can take a picture every 12 to 15 seconds and then posts the picture to a local network via WiFi. Effectively a security camera...

Malware that Forges Bank Statements
From Schneier on Security

Malware that Forges Bank Statements

This is brilliant: The sophisticated hack uses a Trojan horse program installed on the victim's machine that alters html coding before it's displayed in the user's...

The Noisy Channel, Live On CNN!
From The Noisy Channel

The Noisy Channel, Live On CNN!

For anyone who

Charles Leadbeater and Tim Berners-Lee on the digital revolution
From Putting People First

Charles Leadbeater and Tim Berners-Lee on the digital revolution

Digital Revolution (working title) is an open source documentary, due for transmission on BBC Two in 2010, that will take stock of 20 years of change brought about...

In the ASIS&T Bulletin: Reconsidering Relevance and Embracing Interaction
From The Noisy Channel

In the ASIS&T Bulletin: Reconsidering Relevance and Embracing Interaction


HCIR 2009 Proceedings Now Available
From The Noisy Channel

HCIR 2009 Proceedings Now Available

The HCIR 2009 proceedings are now available on the workshop web site. We’re planning to

Jeff Jarvis and Matt Cutts on the New FTC Blog Regulations
From The Noisy Channel

Jeff Jarvis and Matt Cutts on the New FTC Blog Regulations

As has been anticipated for a while–and discussed during the Ethics of Blogging panel–the United States Federal Trade Commission (FTC) has published explicit guidelines...

Leadership Cohort Ohio Update
From Computer Science Teachers Association

Leadership Cohort Ohio Update

I decided to read Outliers by Malcolm Gladwell as it was recommended to me by several people. That in turn let me to read his first book Tipping Point. This may...

UK Defense Security Manual Leaked
From Schneier on Security

UK Defense Security Manual Leaked

Wow. It's over 2,000 pages, so it'll take time to make any sense of. According to Ross Anderson, who's given it a quick look over, "it seems to be the bureaucratic...

Moving Hippos in the Post-9/11 World
From Schneier on Security

Moving Hippos in the Post-9/11 World

It's a security risk: The crate was hoisted onto the flatbed with a 120-ton construction crane. For security reasons, there were no signs on the truck indicating...

Microsoft demos multi-touch enabled mice concepts
From Putting People First

Microsoft demos multi-touch enabled mice concepts

Microsoft is exploring the concept of multi-touch mice, a new research paper reveals. The paper is being presented today as part of the User Interface Software...

How to visualise energy savings
From Putting People First

How to visualise energy savings

Kevin Anderson reports in The Guardian on how a new generation of monitors can generate data about your energy use and help you cut your costs and carbon. “These...

Focus Groups Failing for the Movies
From The Eponymous Pickle

Focus Groups Failing for the Movies

Roger Dooley suggests that the recent mention of using brain scans to provide accurate and specific predictions for scary movie content really shows a further failure...

From Computational Complexity

Two Recent Complexity Books omit Mahaney's theorem- ovesight or wisdom?

In a prior post (a while back) I pondered if Mahaney's theorem (SAT \le_m S, S Spare, implies P=NP) should be taught in a basic grad course in complexity. I thought...

Cellphones as our Remote Controls
From The Eponymous Pickle

Cellphones as our Remote Controls

Steve King writes an excellent blog: Small Business Labs on small business and entrepreneurial topics that is useful. Notable is a recent article on the increasing...

What is more fundamental: Physics or Computer Science?
From Daniel Lemire's Blog

What is more fundamental: Physics or Computer Science?

Computer Science can be taken a natural science: the study of how the universe processes information. If it is a natural science, then does it build on Physics?...

Hill Tech Happenings, Week of October 5
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of October 5

October 7 Meeting: The Information Security and Privacy Advisory Board will meet. The focus of the meeting will be on the NIST Information Technology Laboratory...

Job Competitions
From My Biased Coin

Job Competitions

Stefan Savage made an insightful comment related to the issue of jobs: I've long felt that its a fallacy that there exists a fine-grained Platonic ideal of "goodness"...

Links for 2009-10-05
From Wild WebMink

Links for 2009-10-05

The Cybersecurity Myth Cringely on why the US claim to be in the process of hiring 1,000 "cybersecurity experts" is unlikely to impress any real...

Actual DHS Travel Record
From Schneier on Security

Actual DHS Travel Record

If you were curious what the DHS knows about you.  
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account