acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

USACM and CRA Express Concerns Over Cybersecurity Legislation
From U.S. Public Policy Committee of the ACM

USACM and CRA Express Concerns Over Cybersecurity Legislation

Lost within all the health care legislation coverage was the release of a new draft of S.773, the Cybersecurity Act of 2010. The new draft was released a week...

New Book: <i>Cryptography Engineering</i>
From Schneier on Security

New Book: Cryptography Engineering

I have a new book, sort of. Cryptography Engineering is really the second edition of Practical Cryptography. Niels Ferguson and I wrote Practical Cryptography...

Electronic Health Record Security Analysis
From Schneier on Security

Electronic Health Record Security Analysis

In British Columbia: When Auditor-General John Doyle and his staff investigated the security of electronic record-keeping at the Vancouver Coastal Health Authority...

The Deep Dark Web
From The Eponymous Pickle

The Deep Dark Web

Instructive, most people assume the search engines find everything:" ... Google sees only a fraction of the content that appears on the internet. Stuart Andrews...

Interaction Dynamics and Behavioral Economics
From The Eponymous Pickle

Interaction Dynamics and Behavioral Economics

I recently discovered Interaction Dynamics via their Twitter presence. See also their blog: ' ... Interaction Dynamics is a tool to increase online customer conversions...

? Fixes, needed and delivered
From Wild WebMink

? Fixes, needed and delivered

The EU ACTA Consultation: European Commission vs. European Parliament In the gentlest possible way considering the reactions of other commentators, Geist points...

Back Door in Battery Charger
From Schneier on Security

Back Door in Battery Charger

Amazing: The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a...

Eleven gambits for influencing user behaviour
From Putting People First

Eleven gambits for influencing user behaviour

In his blog, Dan Lockton, a Ph.D. researcher at Brunel University (UK), describes eleven behavioural change patterns “drawn from games or modelled on more playful...

Rethinking Hello World
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Rethinking Hello World

Is it time to rethink and replace

3M Tracking and Inventory System
From The Eponymous Pickle

3M Tracking and Inventory System

In an interesting development: -- 3M Launches Asset and Inventory Tracking System ... The solution includes 13.56 MHz passive RFID tags, handheld and pad readers...

Connectile dysfunction
From Putting People First

Connectile dysfunction

Designers can play a pivotal role, writes Mark Baskinger, associate professor in the School of Design at Carnegie Mellon University, in empowering elders towards...

From Computational Complexity

Stoc Travel Support/WELCOME BACK LANCE!

(REMINDER AND UPDATE: If you are a a grad student you can apply for travel support for STOC 2010. See here for details. One update on that: since registration and...

PDF the Most Common Malware Vector
From Schneier on Security

PDF the Most Common Malware Vector

MS Word has been dethroned: Files based on Reader were exploited in almost 49 per cent of the targeted attacks of 2009, compared with about 39 per cent that took...

Berners-Lee Building Web of Data
From The Eponymous Pickle

Berners-Lee Building Web of Data

Intriguing and a natural expansion on the notion of a semantic web, plus looking at the infrastructure required to deliver it. In ReadWriteWeb: Inventor of the'...

So, you know what
From Daniel Lemire's Blog

So, you know what

Most researchers are convinced that their current work is important. Otherwise, they wouldn’t do it. Yet, few of them work on obviously important things like curing...

The future of health care is social
From Putting People First

The future of health care is social

Too many of us are too busy to be healthy–not because we lack awareness. It’s finding the time to do it that’s the problem. In an age of 24/7 connectivity, time...

Procter Opens e-Store Consumer Lab
From The Eponymous Pickle

Procter Opens e-Store Consumer Lab

I mentioned this some time ago, here is more. Via Richard L. James. Procter has run physical store 'sand boxes' of this type for a long time, it is long overdue...

Hill Tech Happenings, Week of March 22
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of March 22

March 23 Hearing: The Technology and Innovation Subcommittee of the House Science and Technology Committee will hold a hearing on teh National Institute of Standards...

Even More on the al-Mabhouh Assassination
From Schneier on Security

Even More on the al-Mabhouh Assassination

This, from a former CIA chief of station: The point is that in this day and time, with ubiquitous surveillance cameras, the ability to comprehensively analysearticle...

On Building Distinctive Brand Assets
From The Eponymous Pickle

On Building Distinctive Brand Assets

Via Byron Sharp:Understanding, Identifying and Building Distinctive Brand AssetsThis post is part of a continuing series of guest posts. Jenni Romaniuk is an Associate...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account