acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Five Billion Connections
From The Eponymous Pickle

Five Billion Connections

In the BBC: there are now over 5 billion phone connections worldwide. Staggering thought. The globe is a heavily interconnected network.

From Computational Complexity

CRA Snowbird Part I

I just returned home from my first trip to the CRA Snowbird Conference, the biennial meeting of CS chairs and other leaders in the CS community. I really enjoyed...

SIGIR 2010: Day 2 Keynote
From The Noisy Channel

SIGIR 2010: Day 2 Keynote

The second day of the SIGIR 2010 conference kicked off with a keynote by TREC pioneer Donna Harman entitled “Is the Cranfield Paradigm Outdated?”. If you are at...

links for 2010-07-22
From Wild WebMink

links for 2010-07-22

ForgeRock Releases OpenAM 9.5 Software Quite a milestone – this is our first independent release, sourced entirely from community members. It's good stuff too –...

More Research on the Effectiveness of Terrorist Profiling
From Schneier on Security

More Research on the Effectiveness of Terrorist Profiling

Interesting: The use of profiling by ethnicity or nationality to trigger secondary security screening is a controversial social and political issue. Overlooked...

? First Post!
From Wild WebMink

? First Post!

Today is a significant milestone for the new venture I’m helping, ForgeRock. We’ve announced availability of our first full independent release of OpenAM, the open...

Questions for Microsoft Research
From Putting People First

Questions for Microsoft Research

Indrani Medhi, associate researcher in the Technology For Emerging Markets Group at Microsoft Research India, was recently rated one of the

Packaged Goods Company Develops Game
From The Eponymous Pickle

Packaged Goods Company Develops Game

In Mediapost. I like the approach, will follow to see how it develops. ' ... Reckitt Benckiser has created a branded social-media game called poweRBrands, in which...

DARPA a year later
From The Computing Community Consortium Blog

DARPA a year later

Dr. Ken Gabriel, the deputy director of DARPA, delivered a plenary address at CRA

Over-Educated, Yet Under-Qualified?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Over-Educated, Yet Under-Qualified?

You

USACM Comments on National Strategy for Trusted Identities in Cyberspace
From U.S. Public Policy Committee of the ACM

USACM Comments on National Strategy for Trusted Identities in Cyberspace

In late June the White House issued a second Draft of the National Strategy for Trusted Identities in Cyberspace. They opened a public comment process only on...

Book on GCHQ
From Schneier on Security

Book on GCHQ

A book on GCHQ, and two reviews.

From Computational Complexity

Do you want to review a book

I will be sending my next book review column for SIGACT NEWS off on July 28, 2010. It has LOTS of books on its BOOKS I WANT REVIEWED list. YOU get a chance to look...

Intel and the Social Scientists
From The Eponymous Pickle

Intel and the Social Scientists

An interesting post of how Intel is increasingly adopting a social science view. It is intriguing to think of how a company of engineers can move in this direction...

The web means the end of forgetting
From Putting People First

The web means the end of forgetting

Legal scholars, technologists and cyberthinkers are wrestling with the first great existential crisis of the digital age: the impossibility of erasing your posted...

The unintended consequences of Facebook
From Putting People First

The unintended consequences of Facebook

Facebook is about to celebrate its 500-millionth user, but the social media application has had wide consequences, even for those who have never signed on, writes...

Coercing people into a brave new digital world
From Putting People First

Coercing people into a brave new digital world

Design consultant Martyn Perks thinks that a UK government-backed campaign to get the entire UK adult population online “threatens to make cyber slaves of us all...

links for 2010-07-21
From Wild WebMink

links for 2010-07-21

Phase relationships in the standardization process James Gosling wrote in 1990: "standards are increasingly being viewed as competitive weapons rather than as technological...

EU Counterterrorism Strategy
From Schneier on Security

EU Counterterrorism Strategy

Interesting journal article evaluating the EU's counterterrorism efforts.

MySpace and Facebook: How Racist Language Frames Social Media (and Why You Should Care)
From Apophenia

MySpace and Facebook: How Racist Language Frames Social Media (and Why You Should Care)

(This post was written for Blogher and originally posted there.) Every time I dare to talk about race or class and MySpace & Facebook in the same breath, a public...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account