acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Tablet Market
From The Eponymous Pickle

Tablet Market

A look at the current tablet market.  Tablets continue to replace laptops for personal computing and information access  power.  Apples share drops among other...

NSA Implements Two-Man Control for Sysadmins
From Schneier on Security

NSA Implements Two-Man Control for Sysadmins

In an effort to lock the barn door after the horse has escaped, the NSA is implementing two-man control for sysadmins: NSA chief Keith Alexander said his agency...

5 Programming Mistakes To Warn Students About
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

5 Programming Mistakes To Warn Students About

I like posts like 5 Programming Mistakes You Should Stop Making by Rahul Singh because they help me focus my thoughts. Through the summer I am working on planning...

Ph.D thesis: Design with Intent
From Putting People First

Ph.D thesis: Design with Intent

Brunel University London has posted the Ph.D dissertation of Daniel Lockton, entitled “Design with Intent – A design pattern toolkit for environmental & social...

User-centred design on Gov.uk
From Putting People First

User-centred design on Gov.uk

The Design Manual of Gov.uk, the UK Government services and information portal, has a section on user-centred design, whereas the service manual home page describes...

From Computational Complexity

I gave a poster session at Erdos 100- so how did it go?

In a a prior post I suggested that STOC perhaps have people give posters instead of talks. While I doubt this will ever happen I think its worth thinking about,...

Travel Meets Technology: A Weekend in Portland, Oregon.
From updated sporadically at best

Travel Meets Technology: A Weekend in Portland, Oregon.

When Facebook Graph Search came out, skeptics bemoaned the end of personal privacy. Now that people can perform targeted queries over your social media history...

Privacy and Compliance Expertise from P&G
From The Eponymous Pickle

Privacy and Compliance Expertise from P&G

Once again I point to Sandra Hughes' Web site.    She was previously chief privacy officer at Procter & Gamble.   We were colleagues in those years.  We met again...

Computing Table Tops
From The Eponymous Pickle

Computing Table Tops

We saw demonstrations of tabletop computing nearly a decade ago at several labs.  Yet the format has not taken hold, though a few systems are still available.  At...

Income Mobility in the US
From The Eponymous Pickle

Income Mobility in the US

MJ Perry writes and provides an informative map.  Shale oil is a big  driver.

Retail and Big Data
From The Eponymous Pickle

Retail and Big Data

A case of retailer A&P using a big Data Portal.  " ... This cloud-based portal enables retailers to share their proprietary data – including point of sale (POS)...

How the FISA Court Undermines Trust
From Schneier on Security

How the FISA Court Undermines Trust

This is a succinct explanation of how the secrecy of the FISA court undermines trust. Surveillance types make a distinction between secrecy of laws, secrecy of...

Crowdsourced AI Includes Everyday Knowedge
From The Eponymous Pickle

Crowdsourced AI Includes Everyday Knowedge

In New Scientist:  An AI that is apparently equivalent to a 4 year old in a verbal test.   A big part of intelligence is our ability to manage our knowledge of"...

3D Interactive Playground
From The Eponymous Pickle

3D Interactive Playground

Had not heard much from Disney of late in the digital world.  But now an interesting play. Reminiscent of other simulation world ideas, which are usually difficult...

SAP reaching out through user experience and design thinking
From Putting People First

SAP reaching out through user experience and design thinking

Recent SAP application forays include everything from a My Runway fashion shopping application to wellness applications that involve wearable sensors to Big Data...

Marc Rotenberg on the NSA Supreme Court Suit
From Schneier on Security

Marc Rotenberg on the NSA Supreme Court Suit

Marc Rotenberg of EPIC explains why he is suing the NSA in the Supreme Court. And USA Today has a back and forth on the topic.

CS Educator Interview: Mike Zamansky
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CS Educator Interview: Mike Zamansky

Mike Zamansky (wearing the white shirt in the center of the picture) has created a very impressive computer science program at one of New York’s top entrance exam...

Congress to Consider Copyright This Week
From U.S. Public Policy Committee of the ACM

Congress to Consider Copyright This Week

Two U.S. House of Representatives committees will consider copyright issues at three hearings this week.   Markup of H.R. 1123: The Unlocking Consumer Choice and...

Prosecuting Snowden
From Schneier on Security

Prosecuting Snowden

I generally don't like stories about Snowden as a person, because they distract from the real story of the NSA surveillance programs, but this article on the costs...

Datification of Business
From The Eponymous Pickle

Datification of Business

Datification is a new term for me, but a natural next step.  In our own enterprise we drove the use of data for a long time.   Many other companies are now discovering...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account