acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Sony-Prompted Hearing Features Testimony from USACM Chair
From U.S. Public Policy Committee of the ACM

Sony-Prompted Hearing Features Testimony from USACM Chair

Prompted by the massive data breaches of Sony's networks, the Subcommittee on Commerce, Manufacturing and Trade of the House Energy and Commerce Committee held...

? Special 301
From Wild WebMink

? Special 301

I’ve read the USTR‘s Special 301 report so you don’t have to. The worrying conclusions are over on ComputerWorldUK.

Forged Memory
From Schneier on Security

Forged Memory

A scary development in rootkits: Rootkits typically modify certain areas in the memory of the running operating system (OS) to hijack execution control from the...

Google Talks Location Strategy
From The Eponymous Pickle

Google Talks Location Strategy

In Fast Company, well  worth understanding:  Marissa Mayer Talks Location Strategy:  The longtime VP tells us how a simple call for a pizza delivery influences...

NLM:
From The Computing Community Consortium Blog

NLM:

The National Library of Medicine has announced a software development challenge, seeking innovative software applications that use the library’s vast and free biomedical...

NearBuy Systems
From The Eponymous Pickle

NearBuy Systems

Another example of location based interaction with retail and warehouse:" ... There are many business situations when you need to know

Stolen Camera Finder
From Schneier on Security

Stolen Camera Finder

Here's a clever Web app that locates your stolen camera by searching the EXIF data on public photo databases for your camera's serial number.

Teaching Students To Create Their Own Business
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Teaching Students To Create Their Own Business

One of the things that I tell students when I do career talks is that it has never been easier to start a software business than it is today. Many great companies...

Fuzzy Look up In Excel
From The Eponymous Pickle

Fuzzy Look up In Excel

Something I could have used a long time ago, an add-in that does fuzzy look up in Excel.  Thanks.

Mobile Business Intelligence from Tableau
From The Eponymous Pickle

Mobile Business Intelligence from Tableau

I continue to be impressed by Tableau's easy to use BI system, now providing mobile solutions, and touch interaction:" ... Tableau 6.1 provides many new and exciting...

Why is Tesco Struggling in the US?
From The Eponymous Pickle

Why is Tesco Struggling in the US?

From the BBC:  It is not quite so quick and easy as Tesco struggles in US.  Some details.

Choosing Conference Sessions
From Computer Science Teachers Association

Choosing Conference Sessions

The CS&IT Annual Conference is coming up and I am getting more excited all the time. As a computer science teacher, it's always been the best professional development...

Extreme Authentication
From Schneier on Security

Extreme Authentication

Exactly how did they confirm it was Bin Laden's body? Officials compared the DNA of the person killed at the Abbottabad compound with the bin Laden "family DNA"...

Kodu Cup Submission Deadline is May 10th 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Kodu Cup Submission Deadline is May 10th 2011

Just a reminder that the submission deadline for the Microsoft Kodu Cup is next week on May 10th, 2011. There is still time to create a new game with Kodu and...

From Computational Complexity

How has the STRUCTURES, OH- I mean CCC Conference changed: Lets look at the Call For Papers

Complexity theory has changed over the years. How to really track these things? One way is to look at the list of topics on the Call For papers for the CCC conference...

? Interference
From Wild WebMink

? Interference

Canada still in copyright “hall of shame” according to the US The US interference in the copyright policies of other countries – in order to create a benefit for...

SMI Gaze Ware
From The Eponymous Pickle

SMI Gaze Ware

Another eye-tracking system, here from SMI Vision, brought to my attention that is worth looking at.  Listening to the buzz in the enterprise there is increasing...

Osama's Death Causes Spike in Suspicious Package Reports
From Schneier on Security

Osama's Death Causes Spike in Suspicious Package Reports

It's not that the risk is greater, it's that the fear is greater. Data from New York: There were 10,566 reports of suspicious objects across the five boroughs...

Mid Atlantic Developer Expo is Coming!
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Mid Atlantic Developer Expo is Coming!

This event looks interesting. If you are in the mid-Atlantic (say around Virginia) and interested in a local, reasonably prices and potentially seriously educational...

Licensing Bar Code Scanning
From The Eponymous Pickle

Licensing Bar Code Scanning

Good piece in ReadWriteWeb on how ShopSavvy is successfully licensing capability to others, making the capability widely available on mobile.  I have mentioned...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account