acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Talks and presentations from UX Australia
From Putting People First

Talks and presentations from UX Australia

UX Australia 2013, a 4-day user experience design conference that took place in Melbourne at the end of August, has posted a lot of presentation slides and audio...

Fokirtor
From Schneier on Security

Fokirtor

Fokirtor is a Linux Trojan that exfiltrates traffic by inserting it into SSH connections. It looks very well-designed and -constructed.

CSTA 2014 Board of Directors Nominations Open
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CSTA 2014 Board of Directors Nominations Open

Since this past summer I have been a member of the CSTA Board of Directors (thanks again to all of you who voted for me). It’s been an interesting and rewarding...

[Book] Reputation Economics
From Putting People First

[Book] Reputation Economics

Reputation Economics: Why Who You Know Is Worth More Than What You Have by Joshua Klein Palgrave Macmillan Publisher November 2013, 256 pages [Amazon link] Abstract...

UX and the civilizing process
From Putting People First

UX and the civilizing process

Kevin Simler is clearly a highly informed and engaging writer. In this essay, he argues that “UX is etiquette for computers“. “A focus on appearance is just one...

Behavioral change strategy cards
From Putting People First

Behavioral change strategy cards

Artefact Group, the Seattle based design company, has posted the first installment of its Behavior Change toolkit. “We’ve curated this selection of cards to give...

Bringing sharing to Korea
From Putting People First

Bringing sharing to Korea

Richard Heinberg, author of The End of Growth, gave the keynote address at the ‘Seoul Youth Hub Conference 2013, Reshaping the Way We Live’, held in Seoul, Korea...

What human experiences are we missing by adopting new technologies?
From Putting People First

What human experiences are we missing by adopting new technologies?

The more our data is used to determine our needs and desires, the less chance there is for serendipity, writes Bronwen Clune. Are we willing to make this concession...

Wizard Technical Events is Twenty Plus
From The Eponymous Pickle

Wizard Technical Events is Twenty Plus

Wizard Events announces that they have been around for twenty years.  I have scoped out some events with them.   Congratulations!  Their founder Russell Brumfield...

Changing Statistical Standards
From The Eponymous Pickle

Changing Statistical Standards

Debating a standard:Whats in a 95 percent confidence?Is there something special about a 95 percent probability? Absolutely not; a recent paper referred to it as...

Intel Betting on Big Data
From The Eponymous Pickle

Intel Betting on Big Data

In GigaOM:   Not unexpected, have been impressed by Intel's analytical work for some time.  " ... Intel is using big data to improve everything from manufacturing...

Diagrams to Represent Competitors
From The Eponymous Pickle

Diagrams to Represent Competitors

New way to create infographics about your competitors.  The well known petal diagram.   " ....   The Petal Diagram drives your business model canvas ... What the...

Forays Into the Flipped Classroom
From Computer Science Teachers Association

Forays Into the Flipped Classroom

One of the buzzwords in education today is the flipped classroom. I was prompted to try out this model last year when I came down with a stomach bug that prevented...

Unmasking the Puppets
From The Eponymous Pickle

Unmasking the Puppets

From New Scientist and ACM:  An experimental method to unmask sock-puppets (usually phony paid commenters, reviewers or contributors) based on the way they write...

Easy Now
From My Biased Coin

Easy Now

In the past year or so, I've gotten reviews back on multiple papers with the complaint that the result was too simple.  My interpretation of review: sure you might...

Hill Tech Happenings, Week of November 18
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of November 18

November 19 Hearing: The House Science, Space and Technology Committee will hold a hearing on the data security of the Healthcare.gov website. 1o a.m., 2318 Rayburn...

Not all citations are equal: identifying key citations automatically
From Daniel Lemire's Blog

Not all citations are equal: identifying key citations automatically

Suppose that you are researching a given issue. Maybe you have a medical condition or you are looking for the best algorithm to solve your current problem. A good...

GoldieBlox, Rube Goldberg, & Beastie Boys "Princess Machine"
From The Female Perspective of Computer Science

GoldieBlox, Rube Goldberg, & Beastie Boys "Princess Machine"

This video is so beyond awesome that it deserves its own blog post.  I may or may not have shed a few tears watching it.  Keep on kicking butt, GoldieBlox. We need...

Explaining and Speculating About QUANTUM
From Schneier on Security

Explaining and Speculating About QUANTUM

Nicholas Weaver has a great essay explaining how the NSA's QUANTUM packet injection system works, what we know it does, what else it can possibly do, and how to...

Interesting Links 18 November 2013
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 18 November 2013

I made a quick trip to Tucson AZ over the weekend for the CSTA Board meeting. Beautiful part of the country and I wish I had more time to explore it. But meeting...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account