acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

NSF Launches Secure & Trustworthy Cyberspace Program; Webinar Scheduled
From The Computing Community Consortium Blog

NSF Launches Secure & Trustworthy Cyberspace Program; Webinar Scheduled

Last month, the National Science Foundation (NSF) launched a new multi-disciplinary program — Secure and Trustworthy Cyberspace (SaTC)

Free Cryptography Class
From Schneier on Security

Free Cryptography Class

Dan Boheh of Stanford University is teaching a free cryptography class starting in January.

Everything is a service
From Putting People First

Everything is a service

A long essay by Dave Gray, founder of the XPLANE/Dachis Group, explores the topic of the service economy from a user experience point of view. Make sure you read...

Design for digital context (white paper)
From Putting People First

Design for digital context (white paper)

Fjord, the digital design consultancy, has just completed a white paper called “Design for Context: Understanding How User Context is Evolving”, looking at the...

Medical Data Access
From The Eponymous Pickle

Medical Data Access

From Technology Review: Discovered during a look at the 'medical circles'  idea addressed here previously.  To what degree should you have access to data whichDoctors...

Storeflix: A Social Network for Business
From The Eponymous Pickle

Storeflix: A Social Network for Business

Just brought to my attention:  Storeflix.  " ...  The social media application gives businesses the ability to instantly see and analyze their business operations...

The Rock Paper Azure Challenge is back
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

The Rock Paper Azure Challenge is back

The Rock Paper Azure Challenge is back and you could win big! Play Rock, Paper, Scissors in the cloud for your chance  to win a trip to Cancun, an Acer Aspire...

The New Know
From The Eponymous Pickle

The New Know

Colleague Jose Guerra brought this book to my attention.  The New Know: Innovation Powered by Analytics (Wiley and SAS Business Series) by Thornton A. May (Sep "...

From The Computing Community Consortium Blog

Following last month’s focus on smart health and wellbeing, IEEE Intelligent Systems

Gathering BI Requirements
From The Eponymous Pickle

Gathering BI Requirements

From TDWI:    How to interview for business intelligence requirements.  This is fairly obvious, but worth reading if you you are new to this area, or as a reminder...

A Look at Citrix Collaborative Workspace
From The Eponymous Pickle

A Look at Citrix Collaborative Workspace

A post in the HBR blog.   A good look, with pictures,  of the Citrix example.  How can physical spaces promote effective collaboration, innovation, brainstorming...

5% of Adults Use QR Codes
From The Eponymous Pickle

5% of Adults Use QR Codes

This seems quite low, though not far from my own observation, probably mostly those with other technology interests.  The code reading Apps are getting better and...

ShopKick Partners with Visa
From The Eponymous Pickle

ShopKick Partners with Visa

Followed ShopKick for a while due to their more precisely locational approach for a retailer engagement method.   Now a partnership has emerged:   " ... Shopkick...

Round Two Reviewing : An Exercise in Conditional Probabilities
From My Biased Coin

Round Two Reviewing : An Exercise in Conditional Probabilities

We're in "round 2" of reviews for NSDI, and it's brought up a problem for me I've noticed before.  I worry that, subconsciously, I'm inclined to give papers I read...

Interesting Links 21 November 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 21 November 2011

This week will be a short one with the Thanksgiving holiday here in the US later this week. I

From Computational Complexity

The Jobs Bio

I just finished the Walter Isaacson biography of Steve Jobs. Seems like everyone in the blogosphere has analyzed every sentence in the book, so I won't do that....

Third Annual CSEdWeek Just Around the Corner
From The Computing Community Consortium Blog

Third Annual CSEdWeek Just Around the Corner

The third annual Computer Science Education Week — CSEdWeek

Hack Against SCADA System
From Schneier on Security

Hack Against SCADA System

A hack against a SCADA system controlling a water pump in Illinois destroyed the pump. We know absolutely nothing here about the attack or the attacker's motivations...

Open Source Nurtures Innovation
From Wild WebMink

Open Source Nurtures Innovation

Following on from a blog posting about open source and innovation by Stephen O’Grady, I’ve written about the way open source potentially makes innovation easier...

How much should people worry about the loss of online privacy?
From Putting People First

How much should people worry about the loss of online privacy?

Earlier this week, the Wall Street Journal posted excerpts from a debate between Danah Boyd, Stewart Baker, Jeff Jarvis, and Chris Soghoian on privacy: “Privacy...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account