acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Butt Identification
From Schneier on Security

Butt Identification

Here's a new biometric: how you sit: ...researchers there developed a system that can recognize a person by the backside when the person takes a seat. The system...

My favorite posts from 2011
From Daniel Lemire's Blog

My favorite posts from 2011

January: Innovating without permission Not even eventually consistent February: Taking scientific publishing to the next level Ten things Computer Science tells...

From The Computing Community Consortium Blog

msnbc.com’s Cosmic Log is out with its list of the top 11 scientific twists from 2011 this morning: The past year brought us the supercomputer that trounced

Quick links
From Geeking with Greg

Quick links

Some of what has caught my attention recently:Security guru Bruce Schneier predicts "smart phones are going to become the primary platform of attack for cybercriminals"...

Visualizing the Flavor Network
From The Eponymous Pickle

Visualizing the Flavor Network

A flavor network. From FlowingData. The different relationships of flavor and location. An interesting example of visual relationships.

Some of The Fun of Collaborating...The Other People
From My Biased Coin

Some of The Fun of Collaborating...The Other People

One of the things I enjoy most about working in algorithms is the breadth of work I get to do.  And while I've worked on a variety of things, almost all have been...

Computer Science Entrepreneurs
From Computer Science Teachers Association

Computer Science Entrepreneurs

During the last few weeks I have been fondly reminded of the joys I experienced when teaching and working with a student organization and encountering that rare...

Common Statistical Mistakes
From The Eponymous Pickle

Common Statistical Mistakes

Very common examples. I have seen variants of all of these. Still, should be well known to all saavy managers. If you see anything that is similar to these...

From The Computing Community Consortium Blog

The New York Times

The Collar Bomb Robbery
From Schneier on Security

The Collar Bomb Robbery

Really interesting story of the collar-bomb robbery -- and subsequent investigation -- from 2003.

Top Most Read Posts of 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Top Most Read Posts of 2011

It may be a little early to post this but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were...

Wasted Hour(s)
From My Biased Coin

Wasted Hour(s)

Last night I was running some code for a queuing simulation related to some research I'm doing.  This is the Nth time I've used this code;  I wrote up the basic...

Considering Gamification
From The Eponymous Pickle

Considering Gamification

When should you consider the use of game methods for business? This should be carefully considered for applications alternatively in and outside the company,...

Wikipedia of Maps
From The Eponymous Pickle

Wikipedia of Maps

A Challenge to Google. A non charging means via OpenStreetMaps to deliver complex frequently updated global maps. It appears that Google is finally aiming to...

Teach Kid's Ruby
From The Eponymous Pickle

Teach Kid's Ruby

Another example of a teaching language. Here it is Kid's Ruby program development. A quick look makes it appear to be fairly easy to use. The more complex details...

Hacking Subway's POS System
From Schneier on Security

Hacking Subway's POS System

The story of how Subway's point-of-sale system was hacked for $3 million.

Interesting Links 26 December 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 26 December 2011

Well I spent more time on the computer in general and blogging last week then I intended. I may have a problem. I managed to ignore a lot of email and didn

Top Most Read Posts of 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Top Most Read Posts of 2011

It may be a little early but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were far and away...

Customer Lifetime Value Equation
From The Eponymous Pickle

Customer Lifetime Value Equation

Is it of value to Tech?   From Wharton. It is always useful to think about, but may not be the key measurement for all innovations.   The Kindle Fire is brought...

Merry Christmas from the TSA
From Schneier on Security

Merry Christmas from the TSA

Cupcakes deemed security threat: Rebecca Hains says she was going through security at the airport in Las Vegas when a TSA agent pulled her aside and said the cupcake...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account