acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

A problem about Graph Partitions (guest post)

(Guest post from Richard Taylor who requests information on a problem.) The following graph partition problem arises in connection with studies I am doing on...

Opening Locks with Foil Impressioning
From Schneier on Security

Opening Locks with Foil Impressioning

Interesting blog post, with video demonstration, about an improved tool to open high security locks with a key that will just "form itself" if you insert it into...

links for 2010-02-18
From Wild WebMink

links for 2010-02-18

Who Owns Your PC? New Anti-Piracy Windows 7 Update "Phones Home" to Microsoft Every 90 Days It's bad enough to buy a product and...

Cheating In Computer Science Classes
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Cheating In Computer Science Classes

This story on cheating in Computer Science classes is one of  those things that really makes you think. Years ago one of my students was so tired of students looking...

Grocery Barcode Scanning Comparison
From The Eponymous Pickle

Grocery Barcode Scanning Comparison

For a research investigation I have been comparing smartphone-based 2D barcode scanners using an IPhone 3G. Specifically for typical grocery scans of multiple items...

NBC, the Olympics and the Internet
From The Eponymous Pickle

NBC, the Olympics and the Internet

A considerable criticism of NBC's use of the Internet to provide coverage of the Vancouver Olympics. I have done only a little of searching around for alternative...

BBC
From Putting People First

BBC

During a keynote address at Mobile World Congress in Barcelona, Erik Huggers, the BBC Director of Future Media and Technology, shared his plans to make BBC Online...

English via your mobile
From Putting People First

English via your mobile

The BBC reports on Janala, a service that is revolutionising the teaching of English in Bangladesh using simple mobile technology. “Janala – it means Window –...

Bruce Schneier Facebook Page
From Schneier on Security

Bruce Schneier Facebook Page

I finally have control of my Facebook page. There'll be nothing on it that isn't on my blog, but some of you might prefer following my writing from there. (ITwitter...

Insincere Flattery can Work
From The Eponymous Pickle

Insincere Flattery can Work

Roger Dooley reports on a recent study that appears to show is ' .. that even when we realize we are being flattered, and

From Computational Complexity

Kurt Mehlhorn to receive EATCS award

Kurt Mehlhorn will receive EATCS award! Read about it here. He has had a LONG and PRODUCTIVE career with many EXCELLENT papers. While he is mostly known for data...

Google CEO Pushes Mobile
From The Eponymous Pickle

Google CEO Pushes Mobile

In ComputerWorld, from a recent talk, Google CEO Eric Schmidt says that mobile devices are replacing all other tyes of personal computing. Among the evidence '...

Build a Playground!
From Computer Science Teachers Association

Build a Playground!

A playground is generally described as an area designed for children to play freely. Oftentimes playgrounds include jungle gyms, see-saws, overhead ladders, sandboxes...

New Members of the National Academy of Engineering
From The Computing Community Consortium Blog

New Members of the National Academy of Engineering

The National Academy of Engineering has announced the Members of the Class of 2010.

Campbell Soup Labels and Neuromarketing
From The Eponymous Pickle

Campbell Soup Labels and Neuromarketing

Good case study on the use of non-conscious biometric measurements to determine consumers reaction to packaging. Note this was a two year study, indicating considerable...

Mobile Intelligence
From The Eponymous Pickle

Mobile Intelligence

In the January/February issue of IEEE Intelligent Systems, a number of papers devoted to mobile information retrieval and contextual knowledge systems. Including...

links for 2010-02-17
From Wild WebMink

links for 2010-02-17

Music Journalism is the New Piracy yet another illustration why the proposed three-strikes laws are unbalanced and unjust. TheRights...

Botnets Attacking Each Other
From Schneier on Security

Botnets Attacking Each Other

A new Trojan Horse named Spy Eye has code that kills Zeus, a rival botnet.  

Where is the Computer Science at Education Technology Conferences?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Where is the Computer Science at Education Technology Conferences?

I

Creative Destruction and Gillette
From The Eponymous Pickle

Creative Destruction and Gillette

Walter Riker sends this interesting quote and link along. Profound thoughts. Read it all.Gillette, Razor Blades, and Creative Destructionby Jeff StibelGillette...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account