acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Cloud Enhanced  Innovation
From The Eponymous Pickle

Cloud Enhanced Innovation

IBM on how the cloud can drive new, innovative business models.  A largely non technical post with some useful  thoughts.

Trust Requires Transparency
From Schneier on Security

Trust Requires Transparency

Adam Shostack explains to Verisign that trust requires transparency. This is a lesson Path should have learned.

NSF
From The Computing Community Consortium Blog

NSF

The deadline for preliminary proposals to the National Science Foundation’s (NSF) next Expeditions in Computing

How you can help the Federal Research Public Access Act (FRPAA) become law
From Michael Nielsen

How you can help the Federal Research Public Access Act (FRPAA) become law

As many of you no doubt know, the Federal

Data Science e-Book from AnalyticsBridge
From The Eponymous Pickle

Data Science e-Book from AnalyticsBridge

A first draft of a data science e-Book available for free from the AnalyticBridge social network for analytics professionals. . From business analytics professionals...

A Systems Complaint
From My Biased Coin

A Systems Complaint

I think of myself as a person who works both in systems and theory.  And I've found that's often a challenging position.  I've been vocal before that I think theory...

iPads in the Bedroom
From The Eponymous Pickle

iPads in the Bedroom

A recent survey shows that most tablets are used at home rather than on the road.  And in the bedroom, where this post says tablets have become a fixture.  (68%...

Is Twitter Serious?
From The Eponymous Pickle

Is Twitter Serious?

David Carr on the implied seriousness of Tweets.  He makes some interesting points about the difficulty of considering a communications channel very informal, but...

SuperBetter Labs
From The Eponymous Pickle

SuperBetter Labs

Some game designers have put together a system that lets you join an all star team. SuperBetter is an online, social game designed to help you build up personal...

? Eric Whitacre
From Wild WebMink

? Eric Whitacre

Back in December I mentioned that Eric Whitacre’s wonderful choral album “Light and Gold” [Amazon UK | Amazon US] had been nominated for a Grammy award. Well …...

<i>Liars and Outliers</i> Update
From Schneier on Security

Liars and Outliers Update

Liars and Outliers is available. Amazon and Barnes & Noble have ben shipping the book since the beginning of the month. Both the Kindle and the Nook versionsordered...

Redefine the employee
From The Eponymous Pickle

Redefine the employee

With changes in how people communicate, in both social and technical terms, we need to think of new ways to vaul e people.  More thoughts in Chief Learning Officer...

Towards Better Shopper Marketing Strategies
From The Eponymous Pickle

Towards Better Shopper Marketing Strategies

In Mediapost:   Takes a look at a Booz & Company Study: " ... The big challenge, concluded Booz, is for manufacturers to

The President
From The Computing Community Consortium Blog

The President

Later this morning, President Obama will unveil his budget request for FY 2013. A number of budget briefings by Federal funding agencies are scheduled throughout...

Hill Tech Happenings, Week of February 13
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of February 13

February 16 Hearing: The Senate Homeland Security and Government Affairs Committee will hold a hearing on the Cybersecurity and Internet Freedom Act of 2012. 2:30...

From Computational Complexity

Barney the Evil Dinosaur

This is an old story from before I had a blog, but one of my favorite on when technology goes bad. In the late 90's, the undergraduate CS coordinator at the time...

This Thursday, a Symposium on the Impact of NITRD
From The Computing Community Consortium Blog

This Thursday, a Symposium on the Impact of NITRD

Since the dawn of the digital age, fundamental research sponsored by the Federal

What Happens When the Court Demands You Decrypt a Document and You Forget the Key?
From Schneier on Security

What Happens When the Court Demands You Decrypt a Document and You Forget the Key?

Last month, a U.S. court demanded that a defendent surrender the encryption key to a laptop so the police could examine it. Now it seems that she's forgotten the...

Interesting Links 13 February 2012
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 13 February 2012

Home again after a week in Texas! Had a great time in Texas both at the TCEA conference and the steering committee meeting for the CS 2013 project. All in all I...

Message Mapping
From The Eponymous Pickle

Message Mapping

Over the years I have been investigating all sorts of mapping methods.  Concept, process and Mind maps are common approaches that I have used in my work for years...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account