acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The ethnographer’s reading list
From Putting People First

The ethnographer’s reading list

Ethnography Matters has embarked on a new series called “The Ethnographer’s Reading List” with UX professionals discussing their summer reading. Here are the latest...

GPS Provides Teachable Moments
From Computer Science Teachers Association

GPS Provides Teachable Moments

I just drove most of the way across the country (from upstate New York to New Mexico, just shy of 2500 miles). This gave me ample opportunity to ponder my GPS,...

Portable Neuroscience
From The Eponymous Pickle

Portable Neuroscience

Once again, featuring Sands Research portable Neuroactivity capture in the aisle:" ... The use of neuroscience in POPAI's 2012 Shopper Engagement Study made itFull...

Sports Analytics Blog
From The Eponymous Pickle

Sports Analytics Blog

Paul Hare's blog:  The Numbers Don't Lie:  Statistical analysis of evidence in the world of sports.  Moneyball and beyond.

Beyond reliability: An ethnographic study of Wikipedia sources
From Putting People First

Beyond reliability: An ethnographic study of Wikipedia sources

Almost a year ago, Heather Ford was hired by Ushahidi to work as an ethnographic researcher on a project to understand how Wikipedians managed sources during breaking...

Fake Irises Fool Scanners
From Schneier on Security

Fake Irises Fool Scanners

We already know you can wear fake irises to fool a scanner into thinking you're not you, but this is the first fake iris you can use for impersonation: to fool...

Social Technology and Snacks
From The Eponymous Pickle

Social Technology and Snacks

In NYT Technology:   Snack foods are a natural intersection place between social technology and people.   This article addresses work underway and how retailers...

No Plans for Analytics
From The Eponymous Pickle

No Plans for Analytics

CW article on how a survey shows most companies have no plans for big data analytics.  I will go further to say that most companies have coherent plans for any...

In Letter, Bill Wulf Explains Why He Hasn’t “Un-Resigned”
From The Computing Community Consortium Blog

In Letter, Bill Wulf Explains Why He Hasn’t “Un-Resigned”

Last month, we noted that eminent computer scientist Bill Wulf had taken the unprecedented step of resigning from the University of Virginia to protest the ousting...

American Don't Trust the Internet
From The Eponymous Pickle

American Don't Trust the Internet

Says a recent survey presented in Baseline.  But they clearly use the Internet a great deal, even for very important decisions, when they should go elsewhere for...

How to Introduce Big Technology Change
From The Eponymous Pickle

How to Introduce Big Technology Change

Very Good piece from HBR on the rapid introduction of big technology change in the large enterprise, including some consumer package goods examples.    We experienced...

A Workshop on Next-Generational Financial Cyberinfrastructure
From The Computing Community Consortium Blog

A Workshop on Next-Generational Financial Cyberinfrastructure

The following is a special contribution to this blog by Louiqa Raschid, a professor in the School of Business, Institute for Advanced Computer Studies, Department...

From Computational Complexity

A natural function with very odd properties

Last time I posted some questions. Today I post the answer that I know. Is there a subset of [0,1] that is uncountable and has measure 0?  YES- take theCantor...

Hacking Tool Disguised as a Power Strip
From Schneier on Security

Hacking Tool Disguised as a Power Strip

This is impressive: The device has Bluetooth and Wi-Fi adapters, a cellular connection, dual Ethernet ports, and hacking and remote access tools that let security...

Register now for the Grace Hopper Celebration of Women in Computing!
From The Female Perspective of Computer Science

Register now for the Grace Hopper Celebration of Women in Computing!

I'm really excited to be attending this year's Grace Hopper Celebration of Women in Computing in Baltimore, and I hope you'll consider going, too! Tomorrow is the...

Building Private Social Networks
From The Eponymous Pickle

Building Private Social Networks

An idea we experimented with.   In particular as new hires come on board expecting to communicate broadly with a social network.   This makes some good points about...

Design Thinking and Storytelling
From The Eponymous Pickle

Design Thinking and Storytelling

A favorite topic of mine:  Elements of the design and its story place the design in a human context.

Fear-Mongering at TED
From Schneier on Security

Fear-Mongering at TED

This TED talk trots out the usual fear-mongering that technology leads to terrorism. The facts are basically correct, but there are no counterbalancing facts,...

Interesting Links  30 July 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 30 July 2012

Over on the left here is a picture of a group of young women who visited Microsoft in Cambridge MA recently as part of Boston University’s Artemis Project. This...

Hill Tech Happenings, Week of July 30
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of July 30

The Senate will consider cybersecurity legislation this week. Several amendments will be introduced and debated on the floor. July 31 Hearing: The Oversight of...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account