acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Meeting Wiz Appears in Smart Meeting Mag
From The Eponymous Pickle

Meeting Wiz Appears in Smart Meeting Mag

Russell Brumfield, 'the Wiz',  who we have worked with in the area of smart meeting technology and scent delivery strategies, appears in the August 2011 issue of...

Semantic Webs in the Enterprise
From The Eponymous Pickle

Semantic Webs in the Enterprise

The movement of the semantic web into the enterprise.  One domain area at a time.  I have seen this direction as well.  Creating a completely generic solution,even...

Kindle in the Browser
From The Eponymous Pickle

Kindle in the Browser

Amazon now offers a Kindle application for the Safari and Chrome Browsers (others coming) for access to the book reading cloud.    I use their App on the iPhone...

GPRS Hacked
From Schneier on Security

GPRS Hacked

Just announced: Nohl's group found a number of problems with GPRS. First, he says, lax authentication rules could allow an attacker to set up a fake cellular base...

PCAST Sustainability Report Emphasizes
From The Computing Community Consortium Blog

PCAST Sustainability Report Emphasizes

The President’s Council of Advisors on Science and Technology (PCAST) released a report titled Sustaining Environmental Capital: Protecting Society and Economy,

? Amazon Escapes The App Trap
From Wild WebMink

? Amazon Escapes The App Trap

As I predicted in June, Amazon has quietly launched read.amazon.com, a full-featured HTML 5 version of the Kindle that runs perfectly on the iPad, looks for all...

Collaborative Asynchronous Searching
From The Eponymous Pickle

Collaborative Asynchronous Searching

I recently mentioned SearchTeam.  I see it has now been looked at and reviewed in detail in Information Today,  Note in particular the description of the Semantic...

"Taxonomy of Operational Cyber Security Risks"
From Schneier on Security

"Taxonomy of Operational Cyber Security Risks"

I'm a big fan of taxonomies, and this -- from Carnegie Mellon -- seems like a useful one: The taxonomy of operational cyber security risks, summarized in Table...

Computer Science Before Programming
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Computer Science Before Programming

For most people the first real computer science course is introduction to programming. It may be called something else but effectively what it is is a course that...

New Benchmark for AI
From The Eponymous Pickle

New Benchmark for AI

In CACM:  Top chess players can now be defeated by computer programs.  But this has not been the case for the Japanese game Go.  New methods use Monte Carlo simulation...

OggCamp Approaching
From Wild WebMink

OggCamp Approaching

If you’re in the south of England (or want to travel here) don’t forget that OggCamp is being held this weekend. It’s in Farnham, just off the M3, and you’ll want...

Neuromarketing and Big Marketers
From The Eponymous Pickle

Neuromarketing and Big Marketers

A long article in Fast Company on how the company Nielsen subsidiary Neurofocus is working with major companies to implement Neuromarketing.  Quite interesting...

DARPA: Automated Program Analysis for Cybersecurity
From The Computing Community Consortium Blog

DARPA: Automated Program Analysis for Cybersecurity

Fresh on the heels of announcing a call for social media research, DARPA’s Information Innovation Office (I2O) has issued a solicitation for “innovative research...

Free-Riding on Plant Security Countermeasures
From Schneier on Security

Free-Riding on Plant Security Countermeasures

There's a security story from biology I've used a few times: plants that use chemicals to call in airstrikes by wasps on the herbivores attacking them. This is...

Stampt Customer Loyalty App
From The Eponymous Pickle

Stampt Customer Loyalty App

Recently brought to my attention and examined:  Stampt, a simple smartphone based customer loyalty program.  Links to social  networking systems.  More here,

Math and Language
From The Eponymous Pickle

Math and Language

In New Scientist:  Does mathematics depend less on our language than we thought?  Mental calculation methods seem to say so, as well as studies of abacus usage.

Usury and the collapse of empires
From Daniel Lemire's Blog

Usury and the collapse of empires

The American government recently played Russian roulette with its economy by threatening to default on its debt. Of course, nobody actually thought that the Americans...

Is Gamification Bull?
From The Eponymous Pickle

Is Gamification Bull?

Having been a veteran of the AI hype world I am always sensitive and open to criticisms of new technology hype waves.  I like to promote new ideas because I amHere...

links for 2011-08-09
From Wild WebMink

links for 2011-08-09

LibreOffice vs. OpenOffice.org: Showdown for Best Open Source Office Suite | Wazi If LibreOffice maintains the pace of improvement Brian describes here, by the...

NSF Awards CS-Led Health, Robotics Research Center
From The Computing Community Consortium Blog

NSF Awards CS-Led Health, Robotics Research Center

Yesterday, the National Science Foundation (NSF) announced a new five-year, $18.5 million Engineering Research Center (ERC) that will pursue interdisciplinary research...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account