acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Interactive Webinar on NSF’s CyberSEES Program
From The Computing Community Consortium Blog

Interactive Webinar on NSF’s CyberSEES Program

On Monday, November 19, at 4:00 PM EST, the National Science Foundation will hold a webinar on its Cyber-Enabled Sustainability Science and Engineering (CyberSEES)...

Fast Sets of Integers
From Daniel Lemire's Blog

Fast Sets of Integers

Maintaining a set of integers is a common problem in programming. It can also be implemented in many different ways. Maybe the most common implementation uses a...

Posts from FOCS (Part 4)
From My Biased Coin

Posts from FOCS (Part 4)

[Editor: In Part 4 of what now looks to be a 5- or 6-part series of reports from FOCS, second-year graduate student Ludwig Schmidt of MIT contributes a summaryhttp...

From Computational Complexity

If GASARCH Tweeted what would he tweet?

If I tweeted this is what I would tweet: The problem with trying to predict who will win the election. Prez election thought: if you run as yourself and lose (Stevenson...

Wicked Problems
From The Eponymous Pickle

Wicked Problems

We started to use the phrase 'wicked Problem' around the year 2000.  Here is an incomplete analysis of the use of the phrase:   So what is its definition?  I like...

Nicolas Nova interviewed on Ethnography Matters
From Putting People First

Nicolas Nova interviewed on Ethnography Matters

The people from Ethnography Matters, an ethnography group blog that is celebrating its first year anniversary today, interviewed their new regular contributor Nicolas...

How 3 million hours of user-testing fixed the Jawbone Up
From Putting People First

How 3 million hours of user-testing fixed the Jawbone Up

Pulled from store shelves after a month, the first high-profile wearable activity tracker was a humiliation for Jawbone. Now, the Up is back, and anyone vying for...

Strategic Marketing Mix Decisions
From The Eponymous Pickle

Strategic Marketing Mix Decisions

I have been recently been taking a look at the broad concept of marketing mix decisions.  The problem is old:  how do we decide how much promotional dollars toTheir...

An interview with three UX strategists
From Putting People First

An interview with three UX strategists

The role of UX Strategist is a relatively new one on UX design teams, and has recently addressed in two articles on UXmatters: “UX Strategy: The Heart of User-Centered...

Free Online Cryptography Course
From Schneier on Security

Free Online Cryptography Course

Dan Boneh of Stanford University is offering a free online cryptography course. The course runs for six weeks, and has five to seven hours of coursework per week...

Project or Recipe
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Project or Recipe

Chris Lehmann is the principal of the Science Leadership Academy, a partnership school in Philadelphia, and a frequent speaker on educational issues. He’s a great...

A qualitative study of internet non-use in Great Britain and Sweden
From Putting People First

A qualitative study of internet non-use in Great Britain and Sweden

Living Offline – A Qualitative Study of Internet Non-Use in Great Britain and Sweden by Bianca Christin Reisdorf (U. of Oxford, UK), Ann-Sofie Axelsson (Chalmers...

Midsize Organizations: Simpler BI
From The Eponymous Pickle

Midsize Organizations: Simpler BI

Jeff Zabin via Gib Bassett on using simpler business intelligence applications.  Especially for the midsize company. Yes, I agree.  In fact I would take it even...

Keeping Plastic Cards
From The Eponymous Pickle

Keeping Plastic Cards

In GigaOm:   I had always expected that plastic cards would go away once the mobile smartphone-enabled wallet took over.  Here the case is made that cards will...

Another Look at Design and Analytics
From The Eponymous Pickle

Another Look at Design and Analytics

I met Joseph Kyoung-yun  of Wayne State at a talk I gave last week and he was nice enough to send along some background on the work he was doing.  He writes " ....

Fairy Wren Passwords
From Schneier on Security

Fairy Wren Passwords

Mother fairy wrens teach their children passwords while they're still in their eggs to tell them from cuckoo impostors: She kept 15 nests under constant audiotheir...

Book: Advancing Ethnography in Corporate Environments
From Putting People First

Book: Advancing Ethnography in Corporate Environments

Advancing Ethnography in Corporate Environments: Challenges and Emerging Opportunities Edited by Brigitte Jordan Left Coast Press November 2012, 224 pages [Amazon...

Indie Game: The Movie
From The Female Perspective of Computer Science

Indie Game: The Movie

I am very grateful that I will (hopefully) be lucky enough to see my vision for my Gram's House game developed professionally with research grants.  After watching...

CIKM 2012: Notes from a Conference in Paradise
From The Noisy Channel

CIKM 2012: Notes from a Conference in Paradise

The moment I learned that CIKM 2012 would be held in Maui, I knew I had to be there. Having co-organized the CIKM 2011 industry event, I had enough karma to be...

Miriah Meyer Named a 2013 TED Fellow
From The Computing Community Consortium Blog

Miriah Meyer Named a 2013 TED Fellow

Every year since 2007, The TED Fellows program has recognized young innovators from around the globe for their “insightful, bold ideas that have the potential to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account