acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Failure of Social Strategies
From The Eponymous Pickle

Failure of Social Strategies

Charlene Li on the failure of social strategies.  Why most fail.  Agree with many of the points made here.  It can be hard to make them work disconnected from specific...

New SSL Vulnerability
From Schneier on Security

New SSL Vulnerability

It's hard for me to get too worked up about this vulnerability: Many popular applications, HTTP(S) and WebSocket transport libraries, and SOAP and REST Web-services...

NYCE (New York Computer Science and Economics Day) Announcement
From My Biased Coin

NYCE (New York Computer Science and Economics Day) Announcement

I was asked to post the following:We are pleased to announce that NYCE 2012, the fifth annual New YorkComputer Science and Economics Day, will be held in New York...

Developing a user-centered methodology for emerging markets and the BoP
From Putting People First

Developing a user-centered methodology for emerging markets and the BoP

In a long post, emerging markets strategist Niti Bhan [with whom Experientia collaborates] discusses her approach to strategic design planning and concept development...

Regulation as a Prisoner's Dilemma
From Schneier on Security

Regulation as a Prisoner's Dilemma

This is the sort of thing I wrote about in my latest book. The Prisoners Dilemma as outlined above can be seen in action in two variants within regulatory activities...

Vampire Numbers and other Interesting Things
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Vampire Numbers and other Interesting Things

In a Facebook post recently, Gerald Thurman, a computing/math instructor at Scottsdale Community College located in Scottsdale, Arizona introduced me to Vampire...

Coke Does Social and Photo Sharing
From The Eponymous Pickle

Coke Does Social and Photo Sharing

Coke has launched a photo sharing application about 'happy places'.  Nice idea,  how well it will be picked up will depend on.  I worked on such an app, and depends...

Design plus Analytics
From The Eponymous Pickle

Design plus Analytics

Have been re-reading The Design of Business: Why Design Thinking is the Next Competitive Advantage, by Roger Martin.   For background on a talk on innovation I...

Three-Rotor Enigma Machine Up for Auction
From Schneier on Security

Three-Rotor Enigma Machine Up for Auction

Expensive, but it's in complete working order. They're also auctioning off a complete set of rotors; those are even rarer than the machines -- which are often missing...

Why You Can't Vote Online
From The Eponymous Pickle

Why You Can't Vote Online

In a voting line this morning, which was the first time in memory I had waited more than a few minutes,  I noticed the large number of people using smart phones...

Wanted: RSA Exhibitor for Book Signing
From Schneier on Security

Wanted: RSA Exhibitor for Book Signing

Is anyone out there interested in buying a pile of copies of my Liars and Outliers for a giveaway and book signing at the RSA Conference? I can guarantee enormous...

How teens do research in the digital world
From Putting People First

How teens do research in the digital world

According to Pew Internet research, the teachers who instruct the most advanced American secondary school students render mixed verdicts about students’ research...

New Vulnerability Against Industrial Control Systems
From Schneier on Security

New Vulnerability Against Industrial Control Systems

It doesn't look good. These are often called SCADA vulnerabilities, although it isn't SCADA that's involved here. They're against programmable logic controllers...

On Industry Certifications For Students
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

On Industry Certifications For Students

This post all started as a comment on a guest post by Barbara Ericson on Mark Guzdial’s blog - The Need for an Industry-based Java Exam. In that post Barbara makes...

From Gödel's Lost Letter and P=NP

The Election Outcome

We predict that one of three outcomes will happen Nate Silver is arguably the world’s foremost psephologist. This sounds like someone who foretells a person’s future...

Achieving Smarter Commerce:  IBM and DemandTec
From The Eponymous Pickle

Achieving Smarter Commerce: IBM and DemandTec

I have been following DemandTec (Now part of IBM) since they presented at our innovation centers soon after they were formed.  I was impressed by the deep analytics...

I'm Going To Be a TEDx Speaker
From The Female Perspective of Computer Science

I'm Going To Be a TEDx Speaker

I'm happy that I'm starting to get noticed when it comes to my public speaking abilities. My latest speaking request was for a local edition of TED on DecemberTEDxSandyHillWomen...

New Jersey Allows Voting by E-Mail
From Schneier on Security

New Jersey Allows Voting by E-Mail

I'm not filled with confidence, but this seems like the best of a bunch of bad alternatives.

New WWII Cryptanalysis
From Schneier on Security

New WWII Cryptanalysis

I'd sure like to know more about this: Government code-breakers are working on deciphering a message that has remained a secret for 70 years. It was found onSome...

Power Retailers
From The Eponymous Pickle

Power Retailers

In Progressive Retailer.  A near time view of who the power retailers of the future.  Those that operate in mutliple channels.  " ... Manufacturers expect Wal-Mart...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account