acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Comparative Risk of Terrorism
From Schneier on Security

The Comparative Risk of Terrorism

Good essay from the Wall Street Journal: It might be unrealistic to expect the average citizen to have a nuanced grasp of statistically based risk analysis, but...

Denmark Leads the way in Digital Care
From Putting People First

Denmark Leads the way in Digital Care

Using medical devices and notebook computers, Danish patients can see doctors without leaving home, and have the information automatically logged into electronic...

A MobileActive.org whitepaper on scaling mobile services for development
From Putting People First

A MobileActive.org whitepaper on scaling mobile services for development

Katrin Verclas of MobileActive.org has published a whitepaper entitled “Scaling Mobile Services for Development: What Will It Take?”. The paper, originially commissioned...

Thoughts on a Minority Report Interface
From The Eponymous Pickle

Thoughts on a Minority Report Interface

A Minority Report Interface shown at CES. When I see Minority Report style gestural interfaces I wonder if this kind of interaction with jump the physical process...

Computer Engineer Barbie!
From The Computing Community Consortium Blog

Computer Engineer Barbie!

Barbie has had over 120 careers!

Yahoo studies social science
From Putting People First

Yahoo studies social science

Yahoo Labs is beefing up its ranks of social scientists, adding highly credentialed cognitive psychologists, economists and ethnographers from top universities...

The bridge between cultures and design
From Putting People First

The bridge between cultures and design

Microsoft’s Joe Fletcher contributed an intriguing article on software UX in India and China on the ever more interesting Johnny Holland site: “Over roughly the...

The service design era
From Putting People First

The service design era

In a two-part series, Korea’s JoongAng Daily newspaper looks at the rise of service design and the notion that modern product designers need to look well beyond...

My Second CNN.com Essay on the Underwear Bomber
From Schneier on Security

My Second CNN.com Essay on the Underwear Bomber

This one is about our tendency to overreact to rare risks, and is an update of this 2007 essay. I think we should start calling them the "underpants of mass destruction...

Ten Companies to Collaborate around Insight
From The Eponymous Pickle

Ten Companies to Collaborate around Insight

From Research, an interesting concept, including competitors: ' ... Diageo, Johnson & Johnson, Microsoft and Procter & Gamble are among 10 companies taking part...

Metro overtakes Tesco
From The Eponymous Pickle

Metro overtakes Tesco

Metro has overtaken Tesco as the word's second largest retailer in sales.

The end of
From Daniel Lemire's Blog

The end of

In the late sixties and seventies, we wanted universities to become more accessible. We founded the Open University, the Universit

Biweekly links for 01/11/2010
From Michael Nielsen

Biweekly links for 01/11/2010

Carl Zimmer: Science Writing Workshop Later This Month Carl Zimmer is teaching a one-week science writing workshop for science grad students. Martin Rees: A Level...

Actual programming with HTML and CSS (without javascript)
From Daniel Lemire's Blog

Actual programming with HTML and CSS (without javascript)

I usually stick with academic or research issues, but today, I wanted to have some fun. Geek fun. While W3C describes Cascading Style Sheets (CSS) as a mechanism...

From Computational Complexity

Guest Post on ICS 2010 (1 of 3)

Innovations in Computer Science 2010 (post #1) Guest post by Aaron Sterling This is the first of three posts about ICS 2010, the much-discussed "concept...

Small Business Labs
From The Eponymous Pickle

Small Business Labs

Always interesting Small Business Labs posts on employee satisfaction, boomer retirement and small business formation.

Linking Weather to Marketing
From The Eponymous Pickle

Linking Weather to Marketing

A favorite topic is how some retailers and manufacturers can link demand planning to weather. We studied this possibilities as early as the 1970s. Obvious relationships...

768-bit Number Factored
From Schneier on Security

768-bit Number Factored

News: On December 12, 2009, we factored the 768-bit, 232-digit number RSA-768 by the number field sieve. The number RSA-768 was taken from the now obsolete RSA...

Interesting Links 11 January 2010
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 11 January 2010

I’m headed to Tuesday night. I’m looking forward to helping with some Expression Web workshops and spending time at the Microsoft booth. I’m also hoping to meet...

links for 2010-01-11
From Wild WebMink

links for 2010-01-11

Michael Pollan Offers 64 Ways to Eat Food Lovely interview that captures Pollan's humanity. The idea of having a booklet of common...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account