acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Unleashing the Power of Digital Signage
From The Eponymous Pickle

Unleashing the Power of Digital Signage

A book by  Keith Kelsen I just discovered:  Unleashing the Power of Digital Signage.  This was a big topic of the retail innovation center.  How do you successfully...

Big Data is Scaling Analytics
From The Eponymous Pickle

Big Data is Scaling Analytics

It is clear that every enterprise is scaling up their gathering of data,  and  especially getting closer to real time acquisition.  New sensors in everyone's pocket...

A History of the Emoticon
From The Eponymous Pickle

A History of the Emoticon

A Brief History of the Emoticon.  The transferal of emotional hints remains an important and unsolved issue in electronic communications.  I think it needs a further...

Bookworm
From The Eponymous Pickle

Bookworm

A Bookworm interface for an open library.  " ... Bookworm demonstrates a new way of interacting with the millions of recently digitized library books. The Harvard...

Friday Squid Blogging: Sex Life of Deep-Sea Squid
From Schneier on Security

Friday Squid Blogging: Sex Life of Deep-Sea Squid

There's evidence of indiscriminate fertilization in deep-sea squid. They mate with any other squid the encounter, male or female. This unusual behaviour, they...

Computer Science Education Act Introduced in Both Houses
From U.S. Public Policy Committee of the ACM

Computer Science Education Act Introduced in Both Houses

Yesterday, Senator Bob Casey (D-Pennsylvania) and Representative Jared Polis (D-Colorado) introduced legislation to strengthen computer science education in the...

Man-in-the-Middle Attack Against SSL 3.0/TLS 1.0
From Schneier on Security

Man-in-the-Middle Attack Against SSL 3.0/TLS 1.0

It's the Browser Exploit Against SSL/TLS Tool, or BEAST: The tool is based on a blockwise-adaptive chosen-plaintext attack, a man-in-the-middle approach that injects...

Comparing Neuromarketing and Traditional Market Research
From The Eponymous Pickle

Comparing Neuromarketing and Traditional Market Research

Traditional market research or neuromarketing methods?  I have always believed that it is worth thinking of neuromarketing methods as an augmentation of traditional...

ThinkVine Gets Forrester Nod
From The Eponymous Pickle

ThinkVine Gets Forrester Nod

Local company ThinkVine, who I have have talked to  now for a number of years,  has been a leader in marketing mix and promotion analysis work,using unique simulation...

Research Snapshot for Fall 2011
From The Female Perspective of Computer Science

Research Snapshot for Fall 2011

For those of you wondering what the heck I've been up to lately research-wise, wonder no longer! Here's a snapshot of what I've been working on lately and planCognitive...

Marketing Automation
From The Eponymous Pickle

Marketing Automation

In E-Commerce Times:  A good look at what is called marketing automation.  Is it science or not?  Or just a way to push for attention.

Computer Science Education Act
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computer Science Education Act

One of the big issues with computer science education is that it is not an integral part of the curriculum It is almost always an elective and doesn

Practical Quantum Computing
From The Eponymous Pickle

Practical Quantum Computing

Getting closer to practical computing. " ... Physicists find quantum versions of both feedback control and classical computer architecture ... " 

From Computational Complexity

Mahaney's Theorem

Bill has a lot of posts where he questions whether to teach Mahaney's theorem in a graduate complexity class. Since it is one of my favorite theorems and most of...

Apply for NSF
From The Computing Community Consortium Blog

Apply for NSF

The National Science Foundation has issued a solicitation for its East Asia and Pacific Summer Institutes (EAPSI), providing U.S. science and engineering graduate...

The Unintended Consequences of Cyberbullying Rhetoric
From Apophenia

The Unintended Consequences of Cyberbullying Rhetoric

We all know that teen bullying – both online and offline – has devastating consequences. Jamey Rodemeyer’s suicide is a tragedy. He was tormented for being gay....

Three Emerging Cyber Threats
From Schneier on Security

Three Emerging Cyber Threats

On Monday I participated a panel at the Information Systems Forum in Berlin. The moderator asked us what the top three emerging threats were in cyberspace. I...

An Interesting Software Liability Proposal
From Schneier on Security

An Interesting Software Liability Proposal

This proposal is worth thinking about. Clause 1. If you deliver software with complete and buildable source code and a license that allows disabling any functionality...

Sales Motivation With Games
From The Eponymous Pickle

Sales Motivation With Games

   Just received from notable gamification vendor Bunchball.   Some nice ideas embedded here, and where better to try gamification than with a heavily extroverted...

Please enter your password, again and again
From Putting People First

Please enter your password, again and again

Khoi Vinh reflects on the fact (and the user experience) that almost everything on all of his computers and all of his mobile devices can only be accessed with...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account