acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

"1234" and Birthdays Are the Most Common PINs
From Schneier on Security

"1234" and Birthdays Are the Most Common PINs

Research paper: "A birthday present every eleven wallets? The security of customer-chosen banking PINs," by Joseph Bonneau, Sören Preibusch, and Ross Anderson:...

ACM/IEEE-CS Computer Science Curricula 2013 - Strawman draft
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

ACM/IEEE-CS Computer Science Curricula 2013 - Strawman draft

Over the weekend, the ACM/IEEE-CS Computer Science Curricula 2013 committee (of which I am a member) released the first public from this effort. (The announcement...

Principles of Social Interaction Design: An Essay
From Putting People First

Principles of Social Interaction Design: An Essay

Adrian Chan, social media expert and social interaction theorist at Gravity7, has written a long essay to collect his thoughts on social interaction design. “Imperfect...

User experience design is dead; Long live user experience
From Putting People First

User experience design is dead; Long live user experience

With Apple, Inc. having the largest market capitalization of any company in the world, and an endless stream of CEOs and pundits talking about the importance of...

Four new articles from UX matters
From Putting People First

Four new articles from UX matters

UX matters posted yesterday four new articles: The world of services user experience By Baruch Sachs In a services organization, you are not only the UX expert,...

A Fix For E-Mail: Fluent
From The Eponymous Pickle

A Fix For E-Mail: Fluent

I agree that EMail is becoming increasingly hard to deal with.  Too much, too messy, and hard to deal with as an efficient means to store knowledge.  These former...

Supply Chain Analytics is Important
From The Eponymous Pickle

Supply Chain Analytics is Important

A survey of CIO's indicates that   " ... Analytics/business intelligence was the top-ranked technology for 2012 as CIOs are combining analytics with other technologies...

Tailoring Analytical Insights at the Point of Decision
From The Eponymous Pickle

Tailoring Analytical Insights at the Point of Decision

DemandTec is now an IBM Company, but I am continuing to make my way through their solution briefs for retail.  This week I took a look at one that I had not reviewed...

Does CS "Rock" for your students?
From Computer Science Teachers Association

Does CS "Rock" for your students?

One of the more interesting pieces of non-solicited email that I received this morning offered to help me teach like a rock star. I have to admit, the promotional...

LibreOffice Matures
From Wild WebMink

LibreOffice Matures

Now finally and firmly established as an independent entity, The Document Foundation and LibreOffice are a refreshing story of community triumphing over adversity...

SpaceCurve and Complex Location Data
From The Eponymous Pickle

SpaceCurve and Complex Location Data

In GigaOM:  Metadata linked to location.SpaceCurve, a Seattle-based startup pushing a database designed for location data, has raised $2.7 million on the promise...

From The Computing Community Consortium Blog

Last week, the World Economic Forum’s Global Agenda Council on Emerging Technologies released a consensus list — the result of input from “some of the world’s leading...

Secure Wireless Retail Networks
From The Eponymous Pickle

Secure Wireless Retail Networks

Particularly useful for point-of-sale applications.  Press release.   " ... New West Technologies partners with Enterasys Networks and Honeywell to offer secure...

What happens when you get more Ph.D.s?
From Daniel Lemire's Blog

What happens when you get more Ph.D.s?

Following the fall of the USSR, hundreds of world class mathematicians emigrated to the USA. Intuitively, this should have made American mathematics stronger. Did...

Are Librarians Encouraging Public Libraries to Abide by COPPA?
From Apophenia

Are Librarians Encouraging Public Libraries to Abide by COPPA?

The Children’s Online Privacy Protection Act (COPPA) was created to prevent corporations from collecting data about children without parental permission. This law...

From Computational Complexity

Aggie for a Day

About 25 years ago I visited a college friend, David Jackson, then a grad student at Texas A&M. He was a Ph.D. student in Food Science doing his doctorate research...

Covert Communications Channel in Tarsiers
From Schneier on Security

Covert Communications Channel in Tarsiers

Marissa A. Ramsier, Andrew J. Cunningham, Gillian L. Moritz, James J. Finneran, Cathy V. Williams, Perry S. Ong, Sharon L. Gursky-Doyen, and Nathaniel J. Dominy...

Interesting Links 20 February 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 20 February 2012

Happy President

Commercial Drones
From The Eponymous Pickle

Commercial Drones

I read an article recently about a commercial drone being shot down.  Then this NYT article about how commercial drones are now allowed in general.    Heard ofA...

QR Codes for a Timeclock
From The Eponymous Pickle

QR Codes for a Timeclock

Colleague Walter Riker sends along an interesting application for QR codes. Using them as a contactless time and attendance system.  Simple idea.   See theTimestation...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account