acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Did I Actually Say That?
From Schneier on Security

Did I Actually Say That?

I'm quoted (also here) as using this analogy to explain how IT companies will be damaged by the news that they've been collaborating with the NSA: "How would it...

To succeed, adopt the post-industrial view
From Daniel Lemire's Blog

To succeed, adopt the post-industrial view

From time to time, students ask me wether such degree or certificate in computer science will help them get a good job. There is no shortage of studies showing...

CSTA Voice Moving to E-Distribution
From Computer Science Teachers Association

CSTA Voice Moving to E-Distribution

Like many non-profit institutions, CSTA is always looking for new, more efficient ways to do business and for ways to keep CSTA membership free of charge for individual...

Ahalogy for Content Marketing
From The Eponymous Pickle

Ahalogy for Content Marketing

Brought to my attention, formerly Pingage, now Ahalogy.  Previously I wrote about Pingage." ... We're building Ahalogy (formerly Pingage) to solve one simple problem...

Linking Small Business to Innovation
From The Eponymous Pickle

Linking Small Business to Innovation

In Innovation Excellence:  How can small business spot innovation and connect to it?  " ... Our businesses evolve and go through so many changes on a regular basis...

Experientia workshop on strategic UX design for Taiwanese businesses
From Putting People First

Experientia workshop on strategic UX design for Taiwanese businesses

Taiwan meets Italy this week, in a series of workshops and company visits hosted by Experientia for Taiwanese business people. The 15 chief customer experience...

From Computational Complexity

Cryptography and the NSA

Back at Northwestern I occasionally taught an undergraduate cryptography class since I was the local expert in the field (a statement not even remotely true atAdvanced...

Ed Felten on the NSA Disclosures
From Schneier on Security

Ed Felten on the NSA Disclosures

Ed Felten has an excellent essay on the damage caused by the NSA secretly breaking the security of Internet systems: In security, the worst case -- the thing you...

1000 Robots for An Hour of Code
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

1000 Robots for An Hour of Code

BirdBrain Technologies has announced their intention to lend out 1,000 Finch robots as their contribution to this year's Computer Science Education Week and Code...

What are users up to when they have an experience?
From Putting People First

What are users up to when they have an experience?

Understanding the experience of using an object depends on understanding the context of use, argues Jeff Doemland in UX Magazine. However, “The prevailing understanding...

Managing Customer Experience
From The Eponymous Pickle

Managing Customer Experience

An impressive writeup about how companies like McDonald's are attempting to manage customer experience.  Can it really be optimized, as they say, when people are...

Matthew Green Speculates on How the NSA Defeats Encryption
From Schneier on Security

Matthew Green Speculates on How the NSA Defeats Encryption

This blog post is well worth reading, and not just because Johns Hopkins University asked him to remove it, and then backed down a few hours later.

The consumer has spoken but is anyone listening?
From Putting People First

The consumer has spoken but is anyone listening?

One would expect that listening to your customers’ needs and wants is a basic prerequisite for any business active in a competitive industry. It also is understandable...

Design, innovation and government
From Putting People First

Design, innovation and government

Last week Joeri van den Steenhoven, attended the How Public Design? conference in Copenhagen, Denmark, which was organized by MindLab, the Danish design lab that...

The Nature of Book Reviews Here
From The Eponymous Pickle

The Nature of Book Reviews Here

I review books here from time to time.  If you have a book that has anything to do with the content subjects seen here, and want to have it reviewed, contact me...

Limits of Fingerprint Security
From The Eponymous Pickle

Limits of Fingerprint Security

The reported inclusion of fingerprint authentication in new iPhones means we will see this approach being used commonly.  It is very convenient, but has its limitations...

Cerf On the Age of Context
From The Eponymous Pickle

Cerf On the Age of Context

Vint Cerf interview on the Age of context.  His role as evangelist at at Google, and how the times are changing to adapt in a connected world.    " ... “I think...

Harassment in the Computer Science Classroom
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Harassment in the Computer Science Classroom

Two interesting and initially unrelated links came across my computer screen in the past couple of days. One was an image that said “Everyone talks about leaving...

iPhone Fingerprint Authentication
From Schneier on Security

iPhone Fingerprint Authentication

When Apple bought AuthenTec for its biometrics technology -- reported as one of its most expensive purchases -- there was a lot of speculation about how the company...

L'Oreal and E-Commerce
From The Eponymous Pickle

L'Oreal and E-Commerce

In AdAge CMO Strategy  What looks to be a rational way to think about e-commerce, as opposed to pure hype.    Contains detail about what L'Oreal and competitors...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account