acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Best Practices for ECommerce Conversion
From The Eponymous Pickle

Best Practices for ECommerce Conversion

Interesting piece that covers many of the issues and best practices in ECommerce conversion, with associated statistics.

The Full Story of Yahoo's Fight Against PRISM
From Schneier on Security

The Full Story of Yahoo's Fight Against PRISM

In 2008 Yahoo fought the NSA to avoid becoming part of the PRISM program. They eventually lost their court battle, and at one point were threatened with a $250,000...

Teach APCS–A New Shared Resource Site
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Teach APCS–A New Shared Resource Site

A few days ago I was contacted by Christina Cacioppo whose day job is an engineer at a startup but who is also helping to teach Advanced Placement Computer Science...

Why banks need to revamp their user experience
From Putting People First

Why banks need to revamp their user experience

The most interesting things happening in financial services are not happening in financial services, writes Rich Berkman, Associate Partner of IBM Interactive Experience...

Lego as a Tool for Serious Thinking
From The Eponymous Pickle

Lego as a Tool for Serious Thinking

Remember looking at this long ago.  Not sure how commonly it is used.  Small and useful tools for thinking." ... LEGO Serious Play is a way of using LEGO bricks...

Mining Massive Datasets
From The Eponymous Pickle

Mining Massive Datasets

Coursera course from Stanford on Mining Massive Data Sets.  " ... This class teaches algorithms for extracting models and other information from very large amounts...

Identifying Dread Pirate Roberts
From Schneier on Security

Identifying Dread Pirate Roberts

According to court documents, Dread Pirate Roberts was identified because a CAPTCHA service used on the Silk Road login page leaked the users' true location....

Computer Scientist Among the Winners of the 2014 MacArthur “Genius Grant”
From The Computing Community Consortium Blog

Computer Scientist Among the Winners of the 2014 MacArthur “Genius Grant”

The MacArthur Foundation has named its 2014 class of MacArthur Fellows “Genius Grant”, recognizing 21 exceptionally creative individuals with a track record of...

Lying and Ethics
From The Eponymous Pickle

Lying and Ethics

Since I was speaking at a compliance and ethics conference yesterday I have been keenly attuned to the meaning of the terms used by professionals in that area. ...

CPG and E-Commerce
From The Eponymous Pickle

CPG and E-Commerce

In AdAge: " ... Packaged-Goods Marketers Wade Warily Into E-commerce ... Big Brands Stymied by Executional Strategies in a World Where Online Retailers ControlAlso...

Apple and Local Search
From The Eponymous Pickle

Apple and Local Search

The emergence of the Apple Watch will likely start to popularize the use of watch displays by the public.  How will it influence location plays?  In Search Engine...

Identity and Access Intelligence
From The Eponymous Pickle

Identity and Access Intelligence

Gave an invited talk at the SCCE Corporate Compliance conference yesterday in Chicago about compliance analytics.  Met a number of new people and saw examples of...

The week-end freedom test
From Daniel Lemire's Blog

The week-end freedom test

In an earlier post, I compared life in academia with life in industry. One recurring argument to favour an academic job over an industry job is freedom. Of course...

Tracking People From their Cellphones with an SS7 Vulnerability
From Schneier on Security

Tracking People From their Cellphones with an SS7 Vulnerability

What's interesting about this story is not that the cell phone system can track your location worldwide. That makes sense; the system has to know where you are....

NCWIT Aspirations in Computing 2015
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

NCWIT Aspirations in Computing 2015

The nomination period for the 2015 NCWIT Award for Aspirations in Computing is now open. If you know a high school woman who is interested in computing nominate...

From Computational Complexity

Maryland Theory Day October 10!

Univ of Maryland at College Park is having a Theory Day Friday October 10. Free Registration and Free Lunch! (there are no economists coming to tell us therehere...

Watson Analytics Announced Today
From The Eponymous Pickle

Watson Analytics Announced Today

( More here later )http://mobile.nytimes.com/blogs/bits/2014/09/16/ibm-offers-a-data-tool-for-the-mainstream-with-watsons-help/" ... Developing technology is one...

Machine Learning for Data Value
From The Eponymous Pickle

Machine Learning for Data Value

In Informs Analytics MagazineMachine Learning for Big Data Value.Yes, big data helps unveil millions of facts about consumer behavior and trends. Leveraging emerging...

Why I Retweet Things From Heavily Followed People
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Why I Retweet Things From Heavily Followed People

I used to think that retweeting something that someone who had a lot of followers tweeted was a waste of time. After all they reach many more people than I do....

Macy's Rolls out Biggest Beacon Installation
From The Eponymous Pickle

Macy's Rolls out Biggest Beacon Installation

Location based systems continue to move forward.  In ZDNet." ... Macy's rolls out retail's largest beacon installation  —  Summary: Macy's expects to complete the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account