acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Another Project to Measure Twitter Influence
From The Noisy Channel

Another Project to Measure Twitter Influence


AnalyticsBridge
From The Eponymous Pickle

AnalyticsBridge

This newsletter and site were just brought to my attention. Created by Vincent Granville, his blog. Very good overview of predictive analytics, data mining, statistics...

"The Cult of Schneier"
From Schneier on Security

"The Cult of Schneier"

If there's actually a cult out there, I want to hear about it. In an essay by that name, John Viega writes about the dangers of relying on Applied Cryptography...

Real-World Access Control
From Schneier on Security

Real-World Access Control

Access control is difficult in an organizational setting. On one hand, every employee needs enough access to do his job. On the other hand, every time you giverole...

Collaboration Tools at Procter and Cisco
From The Eponymous Pickle

Collaboration Tools at Procter and Cisco

A good overview of the use of collaboration tools in big enterprises.. Object to combine the intellectual property of the entire enterprise. Mostly about the low...

The History of One-Time Pads and the Origins of SIGABA
From Schneier on Security

The History of One-Time Pads and the Origins of SIGABA

Blog post from Steve Bellovin: It is vital that the keystream values (a) be truly random and (b) never be reused. The Soviets got that wrong in the 1940s; as a...

Most Important Math Problem of Our Time
From The Eponymous Pickle

Most Important Math Problem of Our Time

In the CACM: The Status of the P Versus NP ProblemIt's one of the fundamental mathematical problems of our time, and its importance grows with the rise of powerful...

What is CSTA?
From Computer Science Teachers Association

What is CSTA?

The Computer Science Teachers Association has come a long way since its fledgling days after its founding in 2005. The area I am most proud of is our membership...

The value of information
From Putting People First

The value of information

Oliver Reichenstein, a Tokyo-based information architect, explores the value of information: “While producing information costs money, information as such doesn

Eva Hornecker on tangible interaction
From Putting People First

Eva Hornecker on tangible interaction

Eva Hornecker explains on interaction-design.org the evolving concept of Tangible Interaction. “Broadly, Tangible Interaction encompasses user interfaces and interaction...

Exploring first-time internet use via mobiles in a South African women
From Putting People First

Exploring first-time internet use via mobiles in a South African women

Jonathan Donner, a researcher in the Technology for Emerging Markets Group at Microsoft Research India, has submitted a paper — together with Shikoh Gitau and...

Donald Norman on products as services and experiences
From Putting People First

Donald Norman on products as services and experiences

Donald Norman’s latest column for Interactions Magazine explores systems thinking and service design. “A product is actually a service. Although the designer, manufacturer...

Experientia
From Putting People First

Experientia

One of our staff members, senior designer Luca Troisi, worked previously in the yachting industry and has not forgotten those roots when he joined Experientia....

Great Series of Posts on Medical Literature Search
From The Noisy Channel

Great Series of Posts on Medical Literature Search


Playing with Devver
From Return 42;

Playing with Devver

Testing can be a pain. At least in Ruby on Rails. That is, not only writing tests can be tedious, but also running tests can consume sometimes ridiculous amounts...

Toward author-centric science
From Daniel Lemire's Blog

Toward author-centric science

Too many research papers in Computer Science are nonsense: they convey no worthy message. Yet, they pass a Turing test of sort: at a glance, they are indistinguishable...

The Exaggerated Fears of Cyber-War
From Schneier on Security

The Exaggerated Fears of Cyber-War

Good article, which basically says that our policies are based more on fear than on reality. On cyber-terrorism: So why is there so much concern about

Sun's Bloggers' License
From Wild WebMink

Sun's Bloggers' License

As a follow-up to my posting on Monday about the new co-ownership license Sun has offered to all the bloggers on blogs.sun.com, I thought it would be good to post...

Pressure to Limit Behavioral Targeting
From The Eponymous Pickle

Pressure to Limit Behavioral Targeting

Comments on a recent NY Times article. I see the point, this is a common startup direction. Clearly more balance needs to be had between targeting and privacy concerns...

ESA Plans
From My Biased Coin

ESA Plans

I'll be headed to ESA this weekend. My talk is first thing Monday morning, so I'll be there sometime Sunday. If anyone wants to get together for dinner Sunday...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account