acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Gödel's Lost Letter and P=NP

Facts No One Really Checks

Basic theorems that rarely get proved in full detail Laura Smoller is not a theorist, but a historian at the University of Arkansas at Little Rock. She sports the...

From Computational Complexity

The Combinatorics of Batman

(I wrote this post about a year ago but waited until the new Batmanmovie came out to post it. I haven't seen the movie yet sothere may more possibilities to add...

NSF Announces Video Contest for Graduate Research Fellows
From The Computing Community Consortium Blog

NSF Announces Video Contest for Graduate Research Fellows

To help mark the 60th anniversary of its Graduate Research Fellowship Program (GRFP), the National Science Foundation (NSF) has announced a new video contest —...

In Hospital Doctor Bedside Robotics
From The Eponymous Pickle

In Hospital Doctor Bedside Robotics

In Computerworld: A good overview of the development of telemedicine using robotics from iRobot.   Includes images of how this would be implemented.  I suggest...

Is UX strategy fundamentally incompatible with agile or lean UX?
From Putting People First

Is UX strategy fundamentally incompatible with agile or lean UX?

The take of the author Paul Bryan: UX strategy and agile UX are neither compatible nor incompatible. In an agile shop, UX strategists have to get ahead of the curve...

UX for learning: design guidelines for the learner experience
From Putting People First

UX for learning: design guidelines for the learner experience

With educational applications for kids, corporate eLearning, and online degree programs, more and more UX designers face design briefs for creating digital experiences...

Less Groupthink
From The Eponymous Pickle

Less Groupthink

The broad concept of 'brainstorming', beloved by big business for many decades, has taken a hit recently as creating group think pablum that was not worth the effort...

Making Handcuff Keys with 3D Printers
From Schneier on Security

Making Handcuff Keys with 3D Printers

Handcuffs pose a particular key management problem. Officers need to be able to unlock handcuffs locked by another officer, so they're all designed to be opened...

Making Wearable Tech Wearable
From The Eponymous Pickle

Making Wearable Tech Wearable

From Artefactgroup:   A good overview of the subject.  When we explored this we discovered that the devices were not very wearable in the context of performing...

Making wearable technology wearable
From Putting People First

Making wearable technology wearable

This week at the San Francisco Wearable Technology Conference, Jennifer Darmour, UX designer at the Artefact Group, shared with other wearable technology experts...

Experientia collaborating with UCLA Anderson School of Management
From Putting People First

Experientia collaborating with UCLA Anderson School of Management

Experientia is one of 15 Italian companies and 53 companies worldwide participating in UCLA’s exclusive 2012 Global Access Program (GAP). GAP pairs Fully Employed...

Portland Submarine tour
From Wild WebMink

Portland Submarine tour

Portland Submarine tour, a set on Flickr. One enjoyable perk of being a speaker at OSCON and a new author at O’Reilly Media was an invitation to their “Friends”...

Fluid Catalogs
From The Eponymous Pickle

Fluid Catalogs

Are we ready for shopping in a post Pinterest world?  Fluid HTML5 layouts replace the simulated shelf layout in old online retail.   More here.   Better I think...

Digitizing Historical Maps
From The Eponymous Pickle

Digitizing Historical Maps

An interesting example of the digitization of some 200,000 historical maps,  which will ultimately give them much larger distribution and preserve them for the...

“Continuing Innovation in Information Technology”:New NRC Report Links Government Research Investments to Nation’s Leadership
From The Computing Community Consortium Blog

“Continuing Innovation in Information Technology”:New NRC Report Links Government Research Investments to Nation’s Leadership

At the Computing Research Association’s (CRA) biennial Snowbird Conference today, the Computer Science and Telecommunications Board (CSTB) will roll out a new report...

Sociologically Inspired Technology
From The Eponymous Pickle

Sociologically Inspired Technology

In the Edge:   Looking at how people and animals socially interact and applying that organization more broadly.  Akin to agent-based simulation methods we applied...

Silicon Valley worries about addiction to devices
From Putting People First

Silicon Valley worries about addiction to devices

Computers, smartphones and other gadgets have made life easier, but now tech firms are worried that they may be harming people. Huh? Tech firms worried about addiction...

Implicit Passwords
From Schneier on Security

Implicit Passwords

This is a really interesting research paper (article here) on implicit passwords: something your unconscious mind remembers but your conscious mind doesn't know...

Virtual Windows 8 Hands-on-Labs
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Virtual Windows 8 Hands-on-Labs

Ready to learn how to develop for Windows 8? Well perhaps not quite ready for a dedicated machine or concerned about complicated set-up? Well in those cases the...

Make your users do the work
From Putting People First

Make your users do the work

“Make your users do the work< ” is the not very people-centred title of a guest piece by Nir Eyal on Techcrunch. He argues that putting users to work is critical...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account