acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

ACM Washington Update Vol. 15.2 (March 16 2011)
From U.S. Public Policy Committee of the ACM

ACM Washington Update Vol. 15.2 (March 16 2011)

CONTENTS [1] Newsletter Highlights [2] 2010 ACM A.M Turing Award Recognizes Les Valiant [3] USACM Supports Defense Against FY '11 Cuts [4] USACM Comments on Federal...

Governments Should Stop Funding Higher Education
From Daniel Lemire's Blog

Governments Should Stop Funding Higher Education

Everyone knows that publicly funded education is good. Right? Wait! Why? “Education has substantial non-financial benefits.” This argument assumes that people who...

Hacking ATM Users by Gluing Down Keys
From Schneier on Security

Hacking ATM Users by Gluing Down Keys

Clever hack: The thieves glue down the "enter," "cancel" and "clear" buttons on the keypad and wait until the customer goes into the bank for help before withdrawing...

? OSI Governance Landmark
From Wild WebMink

? OSI Governance Landmark

You’ll recall about this time last year I was honoured to join the OSI Board and expressed hopes OSI could move towards representative governance. Well, I spent...

Social media, internet, technology and museums
From Putting People First

Social media, internet, technology and museums

The New York Times has published no less than eight articles at once on the topic of social media, internet, technology and museums. Note the article about the...

Kodu Cup 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Kodu Cup 2011

Create a new game with Kodu and you could win $5,000 for yourself and your school and lots of great technology! Welcome to the Microsoft Kodu Cup: A...

What is the Legacy of Your Online Data?
From The Eponymous Pickle

What is the Legacy of Your Online Data?

Revelatory piece in Popular Mechanics on this mostly overlooked aspect of data privacy. Bottom line, it is unclear:  ' ... Our lives are inundated with more data...

Scanning a Barcode to Save your Place in Line
From The Eponymous Pickle

Scanning a Barcode to Save your Place in Line

A simple clever idea in Mashable: " ... Scan QR codes to save your place on multiple wait lists.Proving that nine guys can successfully launch a startup in 48 hours...

Oracle Mobile Client for Supply Chain
From The Eponymous Pickle

Oracle Mobile Client for Supply Chain

New on Oracle and Supply Chains.    I like that these systems are being delivered for mobile use.  Linking to sensors and other real time connections makes sense...

Google Building Bosses
From The Eponymous Pickle

Google Building Bosses

Google, using analytical methods, discovers that it is listening and asking good questions that are better qualities of a manager than having deep technical experise...

From Computational Complexity

TAMC conference accepts are out/What does a name tell you about a general theory conference?

The TAMC conference list-of-accepts is posted here. TAMC stands for Theory and Application of Models of Computation. For general theory conferences does theFoundations...

Faculty openings in design & human engineering at UNIST in Korea
From Putting People First

Faculty openings in design & human engineering at UNIST in Korea

In December Experientia signed a five-year research and education collaboration agreement with the Design and Human Engineering School (DHE) of the Ulsan National...

links for 2011-03-16
From Wild WebMink

links for 2011-03-16

GNU Free Call Announced This looks like an excellent initiative to create a decentralised voice-over-Internet service. Timely and necessary. (tags: Telephony FOSS...

Hacking Cars with MP3 Files
From Schneier on Security

Hacking Cars with MP3 Files

Impressive research: By adding extra code to a digital music file, they were able to turn a song burned to CD into a Trojan horse. When played on the car's stereo...

Why user experience cannot be designed
From Putting People First

Why user experience cannot be designed

Helge Fredheim wrote a smart article in Smashing Magazine to clarify why UX cannot be designed. “Several models of UX have been suggested, some of which are based...

How honest should smart devices be?
From Putting People First

How honest should smart devices be?

David Sherwin reflects on the frog design blog about the SXSW conference, starting from the questions raised in the contribution by Genevieve Bell (director of...

Rebirth of DIY Software Development
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Rebirth of DIY Software Development

In the heady, exciting, almost wild West atmosphere of the early days of PCs it seemed like almost everyone I knew was writing software in hopes of making a little...

Google Mobile Updated
From The Eponymous Pickle

Google Mobile Updated

I see that the Google mobile App for the IPhone and iPad have been updated to include a much easier to use interface.  More here.  Works particularly well for searching...

The Honesty of Smart Devices
From The Eponymous Pickle

The Honesty of Smart Devices

How Honest should a smart device be?   In Design Mind.   Cultural anthropologists look at the interaction of devices, data and the expectations of human behavior...

Tough Sell: Selling User Experience
From Putting People First

Tough Sell: Selling User Experience

Misha W. Vaughan, architect of applications user experience at Oracle USA, reflects in this interesting, small article for the February 2011 issue of the Journal...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account