acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Problem With Courses
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Problem With Courses

Lots of interesting side comments come up during some curriculum discussions. At a recent meeting of the CS 2013 task force one of the committee members made a...

The Importance of Federal Funding to Research
From The Computing Community Consortium Blog

The Importance of Federal Funding to Research

Steve Lohr from the New York Times published an article today titled, “The Seeds That Federal Money Can Plant,” which explains the importance of federal funding...

Disney 3D Printing
From The Eponymous Pickle

Disney 3D Printing

An example of using 3D printing to create simple displays and sensors.  " ... Aside from simple displays, the process can also be used to produce a variety of sensors...

Teradata and Tibco Spotfire
From The Eponymous Pickle

Teradata and Tibco Spotfire

This press release recently came up in some research  "  ... Tibco Spotfire Announces Expanded Partnership with Teradata to Offer Extreme Data Discovery and Analytics...

On Education and Trust
From The Eponymous Pickle

On Education and Trust

Correspondent and frequent consultant to our enterprise Jerry Michalski gives his first talk at TED, in Copenhagen.  On education on trust.

Augmented Reality Accelerates
From The Eponymous Pickle

Augmented Reality Accelerates

In CWorld:   Augmented Reality Accelerates.  I visited a lab this week that was building novel augmented reality work for local enterprises.  More specifics on...

Making mobile phones work for the poor
From Putting People First

Making mobile phones work for the poor

In this BBC article, David Edelstein, a leader in the mobile for development space, argues that human networks are the essential ingredient for mobile phones to...

Understanding the sensing city
From Putting People First

Understanding the sensing city

Consultant Roger Dennis, who identifies himself as “serendipity architect”, has been writing a series of posts on meetings he had related to the sensing city. Together...

Friday Squid Blogging: Giant Squid Engraving from the 1870s
From Schneier on Security

Friday Squid Blogging: Giant Squid Engraving from the 1870s

Neat book illustration. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Connect & Develop
From The Eponymous Pickle

Connect & Develop

Take a look at Procter & Gamble's Connect and Develop Website.  " ... This site has been created to help external innovators and companies learn how Connect + Develop...

When Will We See Collisions for SHA-1?
From Schneier on Security

When Will We See Collisions for SHA-1?

On a NIST-sponsored hash function mailing list, Jesse Walker (from Intel; also a member of the Skein team) did some back-of-the-envelope calculations to estimate...

An enchanted Odyssey on your iPad
From Putting People First

An enchanted Odyssey on your iPad

Article by Francesca Salvadori, Scuolalvento blog Translation from the Italian Technology is probably the last thing that comes to mind when you think about poetry...

Chris Noessel and Stefan Klocek presentation at D3
From Putting People First

Chris Noessel and Stefan Klocek presentation at D3

In August, Cooper directors Chris Noessel and Stefan Klocek discussed implicit interactions at Device Design Day 2012, organised by Kicker Studio in San Francisco...

Ritual and the service experience
From Putting People First

Ritual and the service experience

The interplay between efficiency and quality in a service experience is often what separates a merely transactional interaction from a valuable and pleasurable...

I have seen the future and it’s worn
From Putting People First

I have seen the future and it’s worn

Paul Taylor of the Financial Times thinks wearable technology lives up to its promise at last. “For years, engineers have envisaged technology so personal that...

Maps Showing Spread of ZeroAccess Botnet
From Schneier on Security

Maps Showing Spread of ZeroAccess Botnet

The folks at F-Secure have plotted ZeroAccess infections across the U.S. and across Europe. It's interesting to see, but I'm curious to see the data normalized...

Google's Virtual Brain
From The Eponymous Pickle

Google's Virtual Brain

Google has long been known for working on techniques that allow the automatic analysis of unstructured data like images and video.  A classic element of human intelligence...

The Real Disruption of 3D Printing
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Real Disruption of 3D Printing

The latest “disruption” people seem to be talking a lot about is 3D printing. A lot of the attention has been caused by a group of people calling themselves Defense...

Lili Cheng: Creativity, Learning, and Social Software (GHC12)
From The Female Perspective of Computer Science

Lili Cheng: Creativity, Learning, and Social Software (GHC12)

Who knew a past in physical architecture would suit a career in technology research so well! Lili Cheng — general manager of Microsoft Research's FUSE labs — did...

Omnibus Software (and hardware)
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Omnibus Software (and hardware)

I have several “Swiss Army” type tools. You know the ones with all the different blades, screw drivers and pliers in one tool. They are ok for simple tasks but...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account