acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Effectiveness of Distributed Teams
From The Eponymous Pickle

Effectiveness of Distributed Teams

This is something we wrestled with a number of times.  Experience did seem to show that a team should be co located to achieve the best effectiveness.  Though the...

Literary Allusion and Google
From The Eponymous Pickle

Literary Allusion and Google

In Roughtype, a good piece on literary allusion and the effect of things like Google Search on communicating.  We live in a world where fewer and fewer of the classics...

Cellular Automata
From The Eponymous Pickle

Cellular Automata

New book on a favorite topic, Cellular Automata, by Thomas M. Li    The paradigm was used in the enterprise.   Too expensive to assure that I will acquire this,...

links for 2011-01-15
From Wild WebMink

links for 2011-01-15

"Word

Private Data Analysis
From The Eponymous Pickle

Private Data Analysis

In the CACM: A Firm Foundation for Private Data Analysis.  What does it mean to preserve privacy? There is lots to do here.

Friday Squid Blogging: Deep-Sea Squid Video
From Schneier on Security

Friday Squid Blogging: Deep-Sea Squid Video

"Anthology of Deep-Sea Squids," from the Monterey Bay Aquarium.

Sneaking Computer Science Into Physics
From The Female Perspective of Computer Science

Sneaking Computer Science Into Physics

I have been trying to convince local participants in the Let's Talk Science program that I can connect almost any of their course material to computer science. ...

Sell to Your Customer's Buying Process
From The Eponymous Pickle

Sell to Your Customer's Buying Process

  Another book added to the stack: Slow Down, Sell Faster!: Understand Your Customer's Buying Process and Maximize Your Sales, by Kevin Davis.  We always tried...

Me on Airport Security
From Schneier on Security

Me on Airport Security

Last week, I spoke at an airport security conference hosted by EPIC: The Stripping of Freedom: A Careful Scan of TSA Security Procedures. Here's the video of my...

Loaded Gun Slips Past TSA
From Schneier on Security

Loaded Gun Slips Past TSA

I'm not really worried about mistakes like this. Sure, a gun slips through occasionally, and a knife slips through even more often. (I'm sure the TSA doesn't catch...

Why of Buy, How of Buy
From The Eponymous Pickle

Why of Buy, How of Buy

IMedia Connections interviews Donna Sturgess of Buyology Inc. about what her company does to understand the non conscious interactions of consumer to media and...

What's Our "Brand"?  Do We Need a New Promotional Plan?
From Computer Science Teachers Association

What's Our "Brand"? Do We Need a New Promotional Plan?

Almost every day I receive electronic newsletters with articles discussing STEM and robotics competitions, but I rarely see a mention of Computer Science. So,ACTE...

Surviving a Terrorist's Nuclear Attack
From Schneier on Security

Surviving a Terrorist's Nuclear Attack

Interesting reading, mostly for the probable effects of a terrorist-sized nuclear bomb. A terrorist bomb is likely to be relatively small -- possibly only a fraction...

? Indemnity
From Wild WebMink

? Indemnity

A Walled Wide Web for Nervous Autocrats I have been making the core point that this good WSJ article makes in my discussions with governments all over the world...

From Putting People First

Sherry Turkle, has been an ethnographer of our technological world for three decades, hosted all the while at one of its epicenters: MIT. A professor of the social...

Global Economy in 2011
From The Eponymous Pickle

Global Economy in 2011

A good piece in Knowledge at Wharton about key aspects and directions of  of the global economy in countries  such as India and China.  Particularly useful for...

Watson Outpaces Jeopardy Wizards in Sneak Preview
From The Computing Community Consortium Blog

Watson Outpaces Jeopardy Wizards in Sneak Preview

“What is Jericho?” Those were the first words from “Watson,” the IBM supercomputer system that’s taking on Ken Jennings and Brad Rutter — the two winningest players...

Social Media Field Guide
From The Eponymous Pickle

Social Media Field Guide

I see that former colleague Krista Neher's new book:  The Social Media Field Guide, is now out.  Much more here and ordering information.  Also see her excellent...

Stealing SIM Cards from Traffic Lights
From Schneier on Security

Stealing SIM Cards from Traffic Lights

Johannesburg installed hundreds of networked traffic lights on its streets. The lights use a cellular modem and a SIM card to communicate. Those lights introduced...

From Computational Complexity

Are you a Ringer? A Reverse Ringer?

A ringer is an impostor, especially one whose pretense is intended to gain an advantage in a competition. This definition is from Wikipedia and agrees with what...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account