acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Internet of things blurs the line between bits and atoms
From Putting People First

Internet of things blurs the line between bits and atoms

In the past few months, companies ranging from giants such as Google to small start-ups have been touting the possibility of interconnecting people and objects...

Open-Source Software Feels Insecure
From Schneier on Security

Open-Source Software Feels Insecure

At first glance, this seems like a particularly dumb opening line of an article: Open-source software may not sound compatible with the idea of strong cybersecurity...

Online Currency: Bitcoin
From The Eponymous Pickle

Online Currency: Bitcoin

Bitcoin, the experiment with encrypted online currency.  Dangerous? A Scam? Revolutionary or just a renaming of something old? Will it be made illegal? It ultimately...

Spear Phishing Attacks from China Against Gmail Accounts
From Schneier on Security

Spear Phishing Attacks from China Against Gmail Accounts

Reporters have been calling me pretty much constantly about this story, but I can't figure out why in the world this is news. Attacks from China -- old news; attacks...

Digital You: a NESTA discussion on telepresence
From Putting People First

Digital You: a NESTA discussion on telepresence

Digital You was an early morning discussion in London, organised by NESTA, that looked at telepresence and the psychology of electronic communications. NESTA is...

Is car sharing the future of the automobile industry?
From Putting People First

Is car sharing the future of the automobile industry?

As much as the car chieftains of Detroit try to fight it, America is slowly but surely turning away from the concept of car ownership. Instead, hundreds of thousands...

Five similarities between collaborative consumption and open-source technology
From Putting People First

Five similarities between collaborative consumption and open-source technology

Tim Hyer, the founder of Rentcycle (an online rental marketplace for those looking to share access rather than retain ownership), was hugely inspired by his previous...

From The Computing Community Consortium Blog

This following a special contribution to this blog by Cindy L. Bethel, a 2009 Computing Innovation Fellow (CIFellow) working with Brian Scassellati in the Social...

From Computational Complexity

Partioning Students

One last Molly post for the end of the school year. Tomorrow is her birthday and I enter that moment I have been dreading for the past thirteen years: Two teenage...

Archiving Everything
From The Eponymous Pickle

Archiving Everything

Remembering being surprised in 2010 that the US Library of Congress was archiving Twitter.   Lots of details about that effort here.  So many data mining opportunities...

Man-in-the-Middle Attack Against the MCAT Exam
From Schneier on Security

Man-in-the-Middle Attack Against the MCAT Exam

In Applied Cryptography, I wrote about the "Chess Grandmaster Problem," a man-in-the-middle attack. Basically, Alice plays chess remotely with two grandmasters...

Crowd Sourced Eyetracking
From The Eponymous Pickle

Crowd Sourced Eyetracking

A look at YouEye ... An interesting concept that is likely very cheap. But what will the quality be like? Tracks using your own camera for user interface design...

Touchscreen vs Heavy Lifting OS
From The Eponymous Pickle

Touchscreen vs Heavy Lifting OS

A look at touchscreen as an interface versus full operating systems. Praises an early look at Windows 8, but says it cannot match the simplicity of an iPad. But...

Ford's Cars to Talk to Each Other
From The Eponymous Pickle

Ford's Cars to Talk to Each Other

GigaOm report on development of technology by Ford to allow cars to talk to each other and avoid crashes and otherwise cooperate.  Cooperative autonomy is interesting...

MindBox
From The Eponymous Pickle

MindBox

Met today with Jeff Dyck of Mindbox Studios.  They have done some very interesting things, including some intriguing work with nonprofits.  Emphasis on symbolic...

Take Virtual Chef Training
From The Eponymous Pickle

Take Virtual Chef Training

Be a virtual Top Chef.  Take the basic training. An example of entertainment based online games.  Not particularly engaging to me, though I am a foodie, but this...

Justin's Poster at FCRC
From My Biased Coin

Justin's Poster at FCRC

Justin Thaler, a student I'm advising (or, quite arguably, the other way around), will be at the poster session for STOC, ready to talk about a bunch of his currently...

NSF Seeking Proposals With
From The Computing Community Consortium Blog

NSF Seeking Proposals With

The NSF’s CISE and Biological Sciences (BIO) directorates have joined forces to seek interdisciplinary proposals that further the frontiers of both fields. In a...

So You Want To Teach Your Kids To Program?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

So You Want To Teach Your Kids To Program?

In all honestly I tend to avoid Slashdot. Oh I scan it for the news from time to time but I work hard at avoiding the comments and avoid the Q&A forums. Why? The...

Designing Pleasurable Products and Interfaces conference
From Putting People First

Designing Pleasurable Products and Interfaces conference

DPPI 11, the 5th conference on Designing Pleasurable Products and Interfaces, will take place in Milan at the end of this month, with Experientia partner Mark Vanderbeeken...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account