acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Windows 8 Release Preview Released
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Windows 8 Release Preview Released

Yesterday Microsoft announced that Windows 8 Release Preview is now available for download in 14 languages. This is the final pre-release, and includes Windows...

The Vulnerabilities Market and the Future of Security
From Schneier on Security

The Vulnerabilities Market and the Future of Security

Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...

Early Details About DARPA
From The Computing Community Consortium Blog

Early Details About DARPA

A number of news outlets have begun covering Plan X, a new five-year, $110 million cyberwarfare research program that the

Ethnographic research in a world of big data
From Putting People First

Ethnographic research in a world of big data

Reacting to the Wired Magazine article that suggests that

Cisco Provides Mobile Forecast
From The Eponymous Pickle

Cisco Provides Mobile Forecast

Some interesting stats from Cisco on the increasing use of mobile and how it is driving internet traffic.  A tidal wave is rising. " ... The

Excellence in Retailing Prize
From The Eponymous Pickle

Excellence in Retailing Prize

The second annual Hub Prize competition, honoring excellence in the retail experience, is now underway and will run through July 31. Honored entries will be featured...

Tax Return Identity Theft
From Schneier on Security

Tax Return Identity Theft

I wrote about this sort of thing in 2006 in the UK, but it's even bigger business here: The criminals, some of them former drug dealers, outwit the Internal Revenue...

How do they know they are interested?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

How do they know they are interested?

Or more importantly how do students know that they are NOT interested in computer science? As I mentioned recently I had a conversation with Mike Zamansky from...

Data alignment for speed: myth or reality?
From Daniel Lemire's Blog

Data alignment for speed: myth or reality?

Compilers align data structures so that if you read an object using 4 bytes, its memory address is divisible by 4. There are two reasons for data alignment: Some...

Facebook threatens to
From Putting People First

Facebook threatens to

Andrew Keen, a British-American entrepreneur and the author of “The Cult of the Amateur” and “Digital Vertigo”, tells CNN why he believes that Facebook is stealing...

My life as me
From Putting People First

My life as me

Ethnographic research by the Ericsson User Experience Lab, in collaboration with Trendethnography, aimed to discover unconscious behaviour related to health and...

Bring Your Own Devices
From The Eponymous Pickle

Bring Your Own Devices

An acronym I have just learned: BYOD, bring your own devices.  The policy of companies allowing employees to use their own devices for internal use.   The practice...

From Computational Complexity

17x17: Paper that solved it available!/A contest inspired by it!/NPC result inspired by it!

Three new 17×17 items: The paper (and some sequels) that SOLVED the 17×17 problem and the 17×18 problem are now available here. (I can't seem to link to the page...

Future  of Money
From The Eponymous Pickle

Future of Money

An impressive special report in IEEE Spectrum on the Future of Money.  With emphasis on the near future direction of electronic payment methods.   Are we in the...

Finding Your Smile
From The Eponymous Pickle

Finding Your Smile

An idea related to previous work at MIT to determine how people reacted to ideas, products and interaction.  We examined this previously to determine how people...

Bar Code Switching
From Schneier on Security

Bar Code Switching

A particularly clever form of retail theft -- especially when salesclerks are working fast and don't know the products -- is to switch bar codes. This particular...

Data Science Summit Videos
From The Eponymous Pickle

Data Science Summit Videos

A  number of videos from the Data Science Summit via Greenplum that are worth examining.   Useful selection from 2011 as well:   The few I have looked at so far...

Why we Lie
From The Eponymous Pickle

Why we Lie

Why we Lie. by Dan Ariely. Why we do, and how he has experimented with methods to increase and decrease the likelihood of the lie.  As usual a thought provoking...

Wearable Computing
From The Eponymous Pickle

Wearable Computing

In the WSJ:  More on wearable computing solutions like Google Glasses.  A favorite topic based on our own experiments.  Inevitable?  " ... Some computer scientists...

The Psychology of Immoral (and Illegal) Behavior
From Schneier on Security

The Psychology of Immoral (and Illegal) Behavior

When I talk about Liars and Outliers to security audiences, one of the things I stress is our traditional security focus -- on technical countermeasures -- is much...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account