acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Data Visualization Infographic
From The Eponymous Pickle

Data Visualization Infographic

An infographic on data visualization.  Explained by the developers in Readwriteweb.  A clever view of the topic as a Venn diagram,  which is useful to take a look...

Benddesk
From The Eponymous Pickle

Benddesk

Reported in Engadget: the Benddesk, a workspace of the future idea that includes a flat table like structure and an integrated background area.  All accessible...

Maybe Course Proliferation Is a Bad Idea?
From Computer Science Teachers Association

Maybe Course Proliferation Is a Bad Idea?

I was prompted after the last CSTA board meeting to write the following, which has now turned into a blog post. My basic question is whether we are doing ourselves...

links for 2010-11-27
From Wild WebMink

links for 2010-11-27

Recommended reading: Control and Community by The 451 Group Lengthy and favourable review of the 451 report on "Control and Community" (which they have very kindly...

Korea
From Putting People First

Korea

The autumn issue of Koreana, the quarterly devoted to Korean art and culture, contains a special feature on Korea’s smartphone era. The articles come in a range...

Business Impact of Web 2.0 Technologies
From The Eponymous Pickle

Business Impact of Web 2.0 Technologies

In the CACM:  Excellent overview article.  Lot of good information to make the case in the enterprise.Business Impact of Web 2.0 TechnologiesWhat do wikis, blogs...

Supply Chain Digest
From The Eponymous Pickle

Supply Chain Digest

Newly updated with a redesign and lots of new information:  The Supply Chain Digest. 

Friday Squid Blogging: Studying Squid Hearing
From Schneier on Security

Friday Squid Blogging: Studying Squid Hearing

At Woods Hole: It is known now, through the work of Mooney and others, that the squid hearing system has some similarities and some differences compared to human...

John Atanasoff
From The Eponymous Pickle

John Atanasoff

I am a long time follower of how historians and media address the history of computing technology.   A new biography of John Atanasoff is now out: The Man Who...

Remarkable scientists without a wikipedia page
From Daniel Lemire's Blog

Remarkable scientists without a wikipedia page

I was surprised today to learn that Michael Ley’s wikipedia page had been deleted (because it failed to indicate the significance of the subject). I have yet to...

Twitter and Collaboration
From The Eponymous Pickle

Twitter and Collaboration

In GigaOm: Interesting thought, but I have not seen this happening .. The Future of Collaboration Brought to You by Twitter The nature of collaboration is changing...

Psychopaths and Security
From Schneier on Security

Psychopaths and Security

I have been thinking a lot about security against psychopaths. Or, at least, how we have traditionally secured social systems against these sorts of people, and...

CHI Twitter Hashtag
From The Female Perspective of Computer Science

CHI Twitter Hashtag

In September I submitted my first CHI paper.  Since then we've got our reviews back and written a rebuttal, and now must wait until the final decision comes down...

Total Trade Optimization
From The Eponymous Pickle

Total Trade Optimization

Via Consumer Goods Technology and Demandtec, an eBook (requires contact information).  In the enterprise we did some early work with Demandtec, an impressive group...

Digital U
From Putting People First

Digital U

Digital U (Youtube) is the the first television/web series to examine how the internet and social media is changing the world around us. Digital U is an eight-part...

links for 2010-11-26
From Wild WebMink

links for 2010-11-26

Leaving MariaDB/Monty Program Henrik has been a key persuader in the emergence of MariaDB, Monty Program AB and the Open Database Alliance from the consequences...

The Withdrawal of the A5/2 Encryption Algorithm
From Schneier on Security

The Withdrawal of the A5/2 Encryption Algorithm

Interesting story of the withdrawal of the A5/2 encryption algorithm from GSM phones.

The public square goes mobile
From Putting People First

The public square goes mobile

Allison Arieff writes in the New York Times Opinionator blog extensively on how citizens harness technology to offer up solutions to problems in their communities...

Car or computer? How transport is becoming more connected
From Putting People First

Car or computer? How transport is becoming more connected

The amount of data that can now be collected about how drivers use their cars is unprecedented, reports the BBC, and the impact of so much information is potentially...

The iPhone experience in Samsung
From Putting People First

The iPhone experience in Samsung

Sunday marks the one-year anniversary of Apple
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account