acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Important IP Case
From My Biased Coin

Important IP Case

For those of you not following the Apple-Samsung case going on right now, it's fascinating.  Since I do expert witness work, it's interesting to me from that perspective...

Wave and Pay via Cheap Chips
From The Eponymous Pickle

Wave and Pay via Cheap Chips

Cheap printable chips have always been mentioned as solutions for making RFID ubiquitous.  Now a cheap chips example for the 'wave and pay' revolution, that isIn...

The Computing Innovation Fellows Project
From The Computing Community Consortium Blog

The Computing Innovation Fellows Project

In early 2009, the Computing Community Consortium (CCC), with the support of the National Science Foundation (NSF), launched the Computing Innovation Fellows Project...

An Analysis of Apple's FileVault 2
From Schneier on Security

An Analysis of Apple's FileVault 2

This is an analysis of Apple's disk encryption program, FileVault 2, that first appeared in the Lion operating system. Short summary: they couldn't break it....

How To Read Code
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

How To Read Code

We don’t teach students how to read code. Actually we don’t event teach them that they should read code for the most part. The closest we get is sample code inprettyprint...

PureFlex Expert System for IT Operations
From The Eponymous Pickle

PureFlex Expert System for IT Operations

I worked on several large scale expert systems applications during the AI drive of the 1990s.  One of the areas we specifically examined was the configuration of...

Retail Mobile Payments Networks
From The Eponymous Pickle

Retail Mobile Payments Networks

In CWorld:   Continued progress in retail payment networks.   " ... More that a dozen retailers including Best Buy, Walmart, Target and 7-Eleven have joined forces...

First Person: Maja Matarić, “the Social Roboticist”
From The Computing Community Consortium Blog

First Person: Maja Matarić, “the Social Roboticist”

University of Southern California computer scientist and neuroscientist Maja Matarić is the subject of an interview appearing in today’s Nature. On the eve of the...

Lousy Password Security on Tesco Website
From Schneier on Security

Lousy Password Security on Tesco Website

Good post, not because it picks on Tesco but because it's filled with good advice on how not to do it wrong.

CSTA Cyber Security Poster Under Development
From Computer Science Teachers Association

CSTA Cyber Security Poster Under Development

In recent months the federal government has expressed increasing concern about our cybersecurity, that is, with our ability to protect the complex computing and...

What Anti-Trafficking Advocates Can Learn from Sex Workers: The Dynamics of Choice, Circumstance, and Coercion
From Apophenia

What Anti-Trafficking Advocates Can Learn from Sex Workers: The Dynamics of Choice, Circumstance, and Coercion

For the last year, I’ve been trying to get my head around different aspects of human trafficking and the commercial sexual exploitation of minors. I’ve been meeting...

Big Data and Optimal Pricing
From The Eponymous Pickle

Big Data and Optimal Pricing

From TDWI:  Optimal pricing is a classical problem, used in retail in some form since the 1960s.   Having more data can make it more accurate and useful.

Product Linkage with a Social Game
From The Eponymous Pickle

Product Linkage with a Social Game

A kind of linkage we explored as far back as the introduction of SimCity.   Now Johnson & Johnson links products with The Sims.  A good example of product - game...

Business Expert Press
From The Eponymous Pickle

Business Expert Press

Just brought to my attention.  The Business Expert Press.  Which publishes short,  inexpensive,  practical and accessible books on key business topics.   In E-book...

Passive Quality Recruiting Networks
From The Eponymous Pickle

Passive Quality Recruiting Networks

This GigaOM piece made me think more broadly about how social networks can be passively recruited.   It used to be that it was always better to get more about you...

Sexual Harassment at DefCon (and Other Hacker Cons)
From Schneier on Security

Sexual Harassment at DefCon (and Other Hacker Cons)

Excellent blog post by Valerie Aurora about sexual harassment at the DefCon hackers conference. Aside from the fact that this is utterly reprehensible behavior...

Computer Science Course Now Online at the Khan Academy
From The Computing Community Consortium Blog

Computer Science Course Now Online at the Khan Academy

Last month at the Computing Research Association’s (CRA) biennial Snowbird Conference, a session titled “Reflections on Teaching Massive Online Open Courses” featured...

<i>Liars and Outliers</i> on Special Discount
From Schneier on Security

Liars and Outliers on Special Discount

Liars and Outliers has been out since late February, and while it's selling great, I'd like it to sell better. So I have a special offer for my regular readers...

Try Kinect at your K-12 School
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Try Kinect at your K-12 School

  Capturing students' interest...

Khan Academy Computer Science
From The Eponymous Pickle

Khan Academy Computer Science

The much talked about Kahn Academy now has a Computer Science Curriculum.  With code examples:  " ... All of the code in the Khan Academy Computer Science platform...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account