acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Messy Analytics
From The Eponymous Pickle

Messy Analytics

The conclusion of a three part series on practical aspects of using analytical methods by Frank Buytendijk.   I had missed the first two parts, but now plan to...

links for 2011-05-10
From Wild WebMink

links for 2011-05-10

Might Be Evil Firefox extension that allows you to keep your Google Docs private from Google if you want to. (tags: FireFox Google Docs Privacy) On Changing horses...

From Computational Complexity

Those Happy Samoans

Below is a post I wrote in 2009 but for some reason never made it to this blog. But I had better post it now because, as I found out via Tony Wirth, Samoa is moving...

The Era of "Steal Everything"
From Schneier on Security

The Era of "Steal Everything"

Good comment: "We're moving into an era of 'steal everything'," said David Emm, a senior security researcher for Kaspersky Labs. He believes that cyber criminals...

Programming with C# and XNA 0.5: Jump Start
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Programming with C# and XNA 0.5: Jump Start

Pat Yongpradit, a talented young HS CS teacher I have written about before, has created  a 5 week mini-course on game programming with XNA Game Studio. This course...

? Launching OpenICF
From Wild WebMink

? Launching OpenICF

I have a firm belief that open source software communities become strong when people with many different reasons for being present are free to meet their needs...

Getting Something from Nothing but from Someone
From The Eponymous Pickle

Getting Something from Nothing but from Someone

A post about my colleague Norm Levy, who I worked with in some particularly innovative projects at the big soap company (Procter & Gamble).  Norm was a pioneerRhymes...

Foursquare Testing NFC
From The Eponymous Pickle

Foursquare Testing NFC

In an interesting development, the game-checking environment has started to test the popular close-range RFID standard NFC.  It will be curious to see what this...

Use and Impact of Neuromarketing
From The Eponymous Pickle

Use and Impact of Neuromarketing

Ron Wright  of Sands Research sends along a note on Oxford doing a study on the use and impact of neuromarketing. " ... Researchers at the University of Oxford...

Quick links
From Geeking with Greg

Quick links

Some of what has caught my attention recently:Apple captured "a remarkable 50% value share of estimated Q1/11 handset industry operating profits among the top 8...

Marketing on Facebook
From The Eponymous Pickle

Marketing on Facebook

Facebook publishes a Guide to Marketing with Facebook.  A set of best practices.  Fourteen pdf pages that are worth reading.   Includes a good set of resources.

Customer Lifetime Value
From The Eponymous Pickle

Customer Lifetime Value

In SASCom Voices.  A talk on a definition of lifetime customer value. " ... Are we oversimplifying customer segmentation and treatment strategies? SAS Marketing...

? One To Follow
From Wild WebMink

? One To Follow

@ForgeRock  ForgeRock has a Twitter account! Follow us to hear all about ForgeRock's news, views and happenings. about 1 hour ago via webReplyRetweetFavorite

2011 Mini-Course: Games Students Made
From The Female Perspective of Computer Science

2011 Mini-Course: Games Students Made

This year's edition of my mini-course (Computer Science and Games: Just for Girls!) wound down at the end of last week.  I made sure to get a copy of the girls'...

Vulnerabilities in Online Payment Systems
From Schneier on Security

Vulnerabilities in Online Payment Systems

This hack was conducted as a research project. It's unlikely it's being done in the wild: In one attack, Wang and colleagues used a plug-in for the Firefox web...

Equity Part II: The Multiple Dimensions of Implementing Equity
From Computer Science Teachers Association

Equity Part II: The Multiple Dimensions of Implementing Equity

In a previous blog entry, I argued that we should address equity in computer science from a civil rights perspective, considering the importance of computing to...

How Teens Understand Privacy
From Apophenia

How Teens Understand Privacy

In the fall, Alice Marwick and I went into the field to understand teens’ privacy attitudes and practices. We’ve blogged some of our thinking since then but we’re...

Hill Tech Happenings, Week of May 9
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of May 9

May 12 Hearing: The Senate Commerce, Science and Transportation Committee will hold a hearing on the economic impacts of cyber attacks (previously scheduled for...

Vendors Mature in Predictive Modeling
From The Eponymous Pickle

Vendors Mature in Predictive Modeling

Business Intelligence vendors are maturing, a report.

Status Report: <i>The Dishonest Minority</i>
From Schneier on Security

Status Report: The Dishonest Minority

Three months ago, I announced that I was writing a book on why security exists in human societies. This is basically the book's thesis statement: All complex...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account