acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Replacing Alice and Bob
From Schneier on Security

Replacing Alice and Bob

A proposal to replace cryptography's Alice and Bob with Sita and Rama: Any book on cryptography invariably involves the characters Alice and Bob. It is always...

From Computational Complexity

Things a Complexity Theorist Should Do At Least Once

A few weeks ago, Suresh wrote a post Things a TCSer should have done at least once with the caveat This list is necessarily algorithms-biased. I doubt you'll need...

Cisco Location Analytics
From The Eponymous Pickle

Cisco Location Analytics

In another move, Cisco is acquiring mobility analytics and Wifi network location player Thinksmart Technologies of Dublin.  The company tracks the location of people...

MySQL FUD Claim Needs Action, Not Words
From Wild WebMink

MySQL FUD Claim Needs Action, Not Words

  A chance encounter at the OFE Summit in Brussels, coupled with a provocative statement by an Oracle VP, lead me to believe it’s time for Oracle to come out of...

Creativity In Computer Science
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Creativity In Computer Science

I was reading a blog post titled Creating creative portfolios by Deepa Muralidhar the other day that really got me thinking of this whole notion of creativity in...

Aaron Marcus publishes (free) ebook about HCI in Sci-Fi
From Putting People First

Aaron Marcus publishes (free) ebook about HCI in Sci-Fi

The Past 100 Years of the Future: Sci-Fi and HCI in Movies and Television by Aaron Marcus 2012 – 197 pages On 24 August 2012, AM+A published its first ebook, The...

Value Added Showrooming
From The Eponymous Pickle

Value Added Showrooming

Good piece by David Bell of Wharton on Showrooming.    " ... With the rise in popularity of smartphones and the proliferation of online retailers, showrooming -...

Apparently the weather is getting cooler…
From Wild WebMink

Apparently the weather is getting cooler…

“Please can you find me a blanket as well?”, Welcome to Autumn. I’d sensed a chill in the air, but my cat confirmed it for me…

Rules and Decision Management
From The Eponymous Pickle

Rules and Decision Management

The large enterprise can think about how to systematize their business processes and the rules that they use to make decisions.  This has often been difficult for...

Facebook Commerce Successful for Small Retail
From The Eponymous Pickle

Facebook Commerce Successful for Small Retail

In CIO:  The claim made here is that Facebook Commerce is becoming particularly successful for small businesses.  " ... Second-quarter profits from Facebook stores...

Mozilla and NSF Announce First Round of Winners for Brainstorming Phase of Ignite Challenge
From The Computing Community Consortium Blog

Mozilla and NSF Announce First Round of Winners for Brainstorming Phase of Ignite Challenge

As we’ve previously blogged, Mozilla and the National Science Foundation (NSF) have teamed up for a challenge, called “Mozilla Ignite“, which focuses on the development...

Professional Development Benefits All
From Computer Science Teachers Association

Professional Development Benefits All

Recently, Rutgers University hosted a CS4HS workshop for K-12 CS educators. With the help of a grant from Google, Rutgers CS Department planned and hosted a two...

What About Small Data?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

What About Small Data?

This is an other post along the lines of We Are Making Things Too Hard more than the more obvious Thinking About Databases. And there may perhaps be a bit of old...

From Gödel's Lost Letter and P=NP

How Not To Prove Integer Factoring Is In P

A possible barrier to proofs that factoring is in polynomial time Mihalis Yannakakis is a Knuth Prize-winning complexity theorist and database expert. With Christos...

Using Agent-Based Simulations to Evaluate Security Systems
From Schneier on Security

Using Agent-Based Simulations to Evaluate Security Systems

Kay Hamacher and Stefan Katzenbeisser, "Public Security: Simulations Need to Replace Conventional Wisdom," New Security Paradigms Workshop, 2011. Abstract: Is...

Data Mining for Drug Facts
From The Eponymous Pickle

Data Mining for Drug Facts

In CACM:  On the use of data mining to determine drug information about drugs  Work out of Stanford University: " ... When people with high blood pressure start...

Alok Nandi to chair Interaction14 – February 2014 in Amsterdam
From Putting People First

Alok Nandi to chair Interaction14 – February 2014 in Amsterdam

The IxDA Board of Directors just announced that Alok Nandi will be Chair of Interaction14, to be held February, 2014 in Amsterdam in conjunction with Utrecht School...

Designing for Mobile, Part 1: Information Architecture
From Putting People First

Designing for Mobile, Part 1: Information Architecture

Mobile devices come with a whole host of new constraints (and opportunities) for our designs. In this – the first part of her series on mobile design – Elaine McVicar...

The magic of good service
From Putting People First

The magic of good service

THE customer is king. So some firms have started appointing chief customer officers (CCOs) to serve the king more attentively. These new additions to the (already...

Book: Life at Home in the Twenty-First Century
From Putting People First

Book: Life at Home in the Twenty-First Century

Life at Home in the Twenty-First Century By Jeanne E. Arnold, Anthony P. Graesch, Enzo Ragazzini, and Elinor Ochs UCLA, Cotson Institute of Archaeology July 2012...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account