acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Students Hack DHS Drone
From Schneier on Security

Students Hack DHS Drone

A team at the University of Texas successfully spoofed the GPS and took control of a DHS drone, for about $1,000 in off-the-shelf parts. Does anyone think that...

Interesting Links 9 July 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 9 July 2012

I am writing this from Irvine California where I have come for the CSTA CS & IT Conference. I have already had a bunch of great conversations with people who arrived...

Design alone can
From Putting People First

Design alone can

Making products attractive and user-friendly is a smart idea, but it is no substitute for R&D and investment, argues James Woudhuysen, a professor of forecasting...

In a Fisher-Price lab, apps become child
From Putting People First

In a Fisher-Price lab, apps become child

At a Fisher-Price lab, researchers watch children at play to come up with ideas for new products, including toys that incorporate apps on iPads and iPhones. At...

Perspectives in experience design
From Putting People First

Perspectives in experience design

Milan Guenther, founding partner of enterprise design associates, explores the word “user” in “user experience”, and compares it to customer experience, employee...

Checking Out With QThru
From The Eponymous Pickle

Checking Out With QThru

A Seattle startup that seeks to deliver smartphone enabled scanning and retail checkout.  More detail at the Qthru site.   We examined this approach a number of...

HCIR 2012 Challenge: People Search
From The Noisy Channel

HCIR 2012 Challenge: People Search

As we get ready for the Sixth Symposium on Human-Computer Interaction and Information Retrieval this October in Cambridge, MA, people around the world are working...

PowerHouse Factories:  Brand Culture Plus Data with Analytics
From The Eponymous Pickle

PowerHouse Factories: Brand Culture Plus Data with Analytics

Reconnected this past week with PowerHouse Factories.  Impressed by their linking branding with data and analytics.   Build the brand, but immediately link in how...

QR Codes on Book Covers
From The Eponymous Pickle

QR Codes on Book Covers

QR codes showing up on all book covers of some publishers.  Like Simon and Schuster.   Not unexpected as more consumers are getting used to seeing the codes in...

From Gödel's Lost Letter and P=NP

Grilling Quantum Circuits

Polynomial algebra turns up the heat Amlan Chakrabarti is currently finishing a postdoc at Princeton University, while on leave from the University of Calcutta...

Less Than Wisdom of Crowds
From The Eponymous Pickle

Less Than Wisdom of Crowds

In the NYT:   A number of recent examples have shown that the crowd, as exemplified by well known wisdom aggregations like Intrade, is not always correct.   Sometimes...

Consumers More Loyal to Store Search
From The Eponymous Pickle

Consumers More Loyal to Store Search

In Progressive Grocer:  Intriguing review of research which says that shoppers search by store for online coupons rather than by brand, and as a result see store...

Operations Research Blogs from Informs
From The Eponymous Pickle

Operations Research Blogs from Informs

A list of blogs and other social networking connections sponsored by Informs.  Includes communities and focused topics that deal with analytics

Stack Ranking Stifles Creativity
From The Eponymous Pickle

Stack Ranking Stifles Creativity

In Forbes:   Microsoft example.  I am inclined to agree, an approach that strictly forces grading on a curve tends to make people less creative, take fewer risks...

NSF: Significant Surge in CS Postdocs in Last Decade
From The Computing Community Consortium Blog

NSF: Significant Surge in CS Postdocs in Last Decade

Last December, we blogged about changes in the number of new Ph.D.s in computer science — a slight increase between 2009 and 2010, but the “fastest growth” of all...

Computational Fairy Tales the Book
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computational Fairy Tales the Book

Just about a year ago I wrote a post about a Computational Fairy Tale blog (Computational Tales) Briefly Dr. Jeremy Kubica, software engineer and manager at Google...

Friday Squid Blogging: Dissecting a Squid
From Schneier on Security

Friday Squid Blogging: Dissecting a Squid

This was suprisingly interesting. When a body is mysterious, you cut it open. You peel back the skin and take stock of its guts. It is the science of an arrow,...

Me on Military Cyberattacks and Cyberweapons Treaties
From Schneier on Security

Me on Military Cyberattacks and Cyberweapons Treaties

I did a short Q&A for Network World.

GPL Forked
From Wild WebMink

GPL Forked

A new project that forks the GPL shows that Github isn’t just for software developers. See my column in InfoWorld this week for more.

Security BYOD Tweet Chat
From The Eponymous Pickle

Security BYOD Tweet Chat

I have not been particularly fond of the public Tweet chat, an organized interaction between vendor experts and anyone who wants to join in.  But lately I havehttp...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account