acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Nestor’s World, a Belgian social design tool
From Putting People First

Nestor’s World, a Belgian social design tool

The full service design agency Pars Pro Toto in Ghent, Belgium built the “Wereld van Nestor” [Nestor's World], a social design tool meant to help local governments...

Robots for IPad
From The Eponymous Pickle

Robots for IPad

IEEE Spectrum has just published an publication App that surveys a number of robots and robotic applications.   This appears to be only available for the iPad systems...

From Computational Complexity

App Love

First a shout out to our friends up north on the 30th anniversary of the New York Theory Day this Friday. Just two years ago I wrote a post Gadget Love but now...

James Bond Movie-Plot Threats
From Schneier on Security

James Bond Movie-Plot Threats

Amusing post on the plausibility of the evil plans from the various movies.

The rise of the sharing communities
From Putting People First

The rise of the sharing communities

As the sharing economy picks up momentum, its reach has become global. In cities and towns around the world, people are creating ways to share everything from baby...

Cool Toys For Teaching Software and Engineering
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Cool Toys For Teaching Software and Engineering

I’m attending the Christa McAuliffe Technology Conference this week and spent the morning in the exhibit hall. Most of the hall is stuff I’m not that interested...

Thomas Malone on Collective Intelligence
From The Eponymous Pickle

Thomas Malone on Collective Intelligence

Thomas W Malone was a consultant for us for a number of years. here  he writes in the Edge on collective intelligence.  Of course our intelligence has always been...

The Psychology of IT Security Trade-offs
From Schneier on Security

The Psychology of IT Security Trade-offs

Good article. I agree with the conclusion that the solution isn't to convince people to make better choices, but to change the IT architecture so that it's easier...

The skyscrapers of tomorrow: Experientia features in eVolo 2012 competition
From Putting People First

The skyscrapers of tomorrow: Experientia features in eVolo 2012 competition

Working together with Marco Visconti architects, Experientia has created a forward-looking skyscraper concept, addressing the theme of global warming. The Visconti...

Try Going a Day Without Technology!
From Computer Science Teachers Association

Try Going a Day Without Technology!

It's no doubt that most of us have become dependent (if not addicted) to technology. We rely on our cell phones, texting, Facebook, Twitter, and Internet searches...

Privacy Implications of Cyborg Eyepieces
From The Eponymous Pickle

Privacy Implications of Cyborg Eyepieces

Much has been heard about the 'Google Glasses' idea of letting someone experience a place overlaid with a computer screen.  We examined eye tracking and Neuromarketing...

Get Your Washing Machine to Text
From The Eponymous Pickle

Get Your Washing Machine to Text

The Internet of things, where all things have an address and can communicate.  Here, word of a way you can text the concept with real things.

CIFellow Sharoda Paul Featured in the New York Times
From The Computing Community Consortium Blog

CIFellow Sharoda Paul Featured in the New York Times

Sharoda Paul, a former CIFellow, was recently featured in the New York Times article,“Looking to Industry for the Next Digital Disruption.” After her postdoctoral...

Classified Information Confetti
From Schneier on Security

Classified Information Confetti

Some of the confetti at the Macy's Thanksgiving Day Parade in New York consisted of confidential documents from the Nassau County Police Department, shredded sideways...

Hackback
From Schneier on Security

Hackback

Stewart Baker, Orin Kerr, and Eugene Volokh on the legality of hackback.

Locked-In With Open Source?
From Wild WebMink

Locked-In With Open Source?

You can be if it’s not really open source. While open source forms a part of many proprietary solutions, the term “open source” should only be used to describe...

Words Matter
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Words Matter

Not long ago someone tweeted “Stop using "guru," "ninja," and other terms for job descriptions. You are a Sparkly Code Princess. Own it!” It’s been running though...

IBM DemandTec for Marketers
From The Eponymous Pickle

IBM DemandTec for Marketers

From IBM DemandTec, a good view of the need to construct valid shopper segmentation.  Why?  So we can use targeting to make sure the right consumer gets the most...

MyGOSSCon Slides
From Wild WebMink

MyGOSSCon Slides

I gave a presentation yesterday in Malaysia on the forces driving change in open source; here are the slides.

Data Analytics Foundation
From The Eponymous Pickle

Data Analytics Foundation

New and growing.   Contact us for more information.Data Analytics Foundation works with market-leading companies across multiple verticals, solving high impact...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account