acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Fiona Apple Wears a Squid as a Hat in New Video
From Schneier on Security

Friday Squid Blogging: Fiona Apple Wears a Squid as a Hat in New Video

Even I think this is weird.

CSEA Legislation Timeline
From Computer Science Teachers Association

CSEA Legislation Timeline

There is so much momentum around the need for more computer science education in the country's schools, and many organizations in addition to CSTA are now working...

D-Link Router Backdoor
From Schneier on Security

D-Link Router Backdoor

Several versions of D-Link router firmware contain a backdoor. Just set the browser's user agent string to "xmlset_roodkcableoj28840ybtide," and you're in. (Hint...

Dilbert in the Enterprise
From The Eponymous Pickle

Dilbert in the Enterprise

In the HBR:   We were heavy users of the Dilbert strip in the enterprise.   They found their way into many slide shows.  We thought that Scott Adams must have been...

Amazon and Google in the Supply Chain
From The Eponymous Pickle

Amazon and Google in the Supply Chain

So true, worth looking at again:Why distributors should pay attention to Amazon, Google Amazon's B2B online channel Amazon Supply and Google's Google Shopping for...

Call for Participation: 2014 Workshop on ACM History
From The Computing Community Consortium Blog

Call for Participation: 2014 Workshop on ACM History

The ACM History Committee (http://history.acm.org/) is sponsoring a two-day archiving workshop to help diffuse knowledge of professional archival practices into...

Deadline for Proposals for CSTA Conference Approaching
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Deadline for Proposals for CSTA Conference Approaching

The deadline for session and workshop proposals for the 2014 CSTA conference on K-12 computer science education is November 15, 2013. In addition to 3-hour workshops...

Identifying Cell Phones Through Sensor Imperfections
From Schneier on Security

Identifying Cell Phones Through Sensor Imperfections

There seems to be a bunch of research into uniquely identifying cell phones through unique analog characteristics of the various embedded sensors. These sortsSlashdot...

What behavioral economics is not
From Putting People First

What behavioral economics is not

Essay: The Nature of the BEast: What Behavioral Economics Is Not 10/16/13 Matthew Darling, Saugato Datta, and Sendhil Mullainathan People are complex; they defy...

An obstacle to patient-centered care: poor supply systems
From Putting People First

An obstacle to patient-centered care: poor supply systems

It is widely acknowledged that patients and their families should be deeply involved in the design of and decisions about the health care that the former receive...

P&G Gym from IDEO
From The Eponymous Pickle

P&G Gym from IDEO

For a recent talk I had to research some of the work that IDEO did for P&G.  I re-discovered this Bloomberg article about the design work that IDEO did to helpWayne...

Injecting Serious CS into a STEM Course
From Computer Science Teachers Association

Injecting Serious CS into a STEM Course

My school district has a STEM course in the high school that is meeting the district's computer science graduation requirement. That means that the STEM students...

Topology Mapping for Analytics
From The Eponymous Pickle

Topology Mapping for Analytics

Seems Vincent Granville has been thinking similarly lately.  See his article and code in Data Science Central:   A little known component that should be part of...

"A Court Order Is an Insider Attack"
From Schneier on Security

"A Court Order Is an Insider Attack"

Ed Felten makes a strong argument that a court order is exactly the same thing as an insider attack: To see why, consider two companies, which we'll call Lavabit...

Simons Research Fellowships Post
From My Biased Coin

Simons Research Fellowships Post

Alistair Sinclair asked me to post a note about the Simons Research Fellowships positions at Berkeley.  But since that's where Justin Thaler (my now-ex student)...

Toward Star Trek economics
From Daniel Lemire's Blog

Toward Star Trek economics

Characters in the Star Trek universe often claim that their future Earth has abolished money. Everyone gets what he needs and nobody works for money. Unfortunately...

Simple Model of Persuasion
From The Eponymous Pickle

Simple Model of Persuasion

In Neuroscience Marketing: " ... The Persuasion Slide™. In short, it’s a simple model for persuasion that encompasses a variety of conscious and non-conscious factors...

Career Technical Schools and Computer Science
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Career Technical Schools and Computer Science

Over the years I have gotten involved with a number of career technical schools in New England. Several in New Hampshire where I live and several in Massachusetts...

Slides from 'Coherent Emergent Stories in Video Games' / GHC13
From The Female Perspective of Computer Science

Slides from 'Coherent Emergent Stories in Video Games' / GHC13

I gave a talk at this year's Grace Hopper on what I've been working on for my thesis project:Coherent Emergent Stories in Video GamesCrafting satisfying narratives...

US Alternative Fueling Stations Visualization
From The Eponymous Pickle

US Alternative Fueling Stations Visualization

A good interactive data visualization from Tableau.  In their public gallery.  This would have been useful for a study I did a few years ago on the effects on the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account