acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Real Code is Messy
From Computer Science Teachers Association

Real Code is Messy

Reading John Harrison's blog of November 3 got me thinking about what I am trying to teach my students in my third-semester (university) course about the development...

Users Rationally Rejecting Security Advice
From Schneier on Security

Users Rationally Rejecting Security Advice

This paper, by Cormac Herley at Microsoft Research, sounds like me: Abstract: It is often suggested that users are hopelessly lazy and unmotivated on securityme...

Run-length encoding (part I)
From Daniel Lemire's Blog

Run-length encoding (part I)

Run-length encoding (RLE) is probably the most important and fundamental string compression technique. Countless multimedia formats and protocols use one form or...

An Extra Piece of Chicken
From The Eponymous Pickle

An Extra Piece of Chicken

I see that Marco Marsan has set up a new site and blog for Marco Polo, his strategic innovation company. So what is this about chicken? See his great story about...

From Computational Complexity

DIMACS at 20

Last Friday DIMACS celebrated its 20th anniversary. Muthu summarizes the event. DIMACS has served the theoretical computer science community well over these two...

4-Year Masters
From My Biased Coin

4-Year Masters

Harvard, like many other places, has an option by which students (with "Advanced Standing" from AP classes) can obtain a Master's (in some programs) as well as...

Spectacle at Web2.0 Expo... From my Perspective
From Apophenia

Spectacle at Web2.0 Expo... From my Perspective

Last week, I gave a talk at Web2.0 Expo. From my perspective, I did a dreadful job at delivering my message. Yet, the context around my talk sparked a broad conversation...

Norbt
From Schneier on Security

Norbt

Norbt (no robot) is a low-security web application to encrypt web pages. You can create and encrypt a webpage. The key is an answer to a question; anyone who...

links for 2009-11-24
From Wild WebMink

links for 2009-11-24

Capitalism's Fundamental Flaw From Forbes, no less: "In 2009, 30 million people sit unemployed in America. Yet, the speculators have managed to...

IKEA and Facebook
From The Eponymous Pickle

IKEA and Facebook

IKEA uses facebook tagging to promote creative new store opening.-

Decertifying "Terrorist" Pilots
From Schneier on Security

Decertifying "Terrorist" Pilots

This article reads like something written by the company's PR team. When it comes to sleuthing these days, knowing your way within a database is as valued a skill...

L'Oreal Case Study on Mobility
From The Eponymous Pickle

L'Oreal Case Study on Mobility

I see that Consumer Goods Technology will be presenting a webinar tomorrow: The Booming Value of Mobility - In the Enterprise and Beyond. L'Oreal will be among...

Printing all the Science News that Fits
From The Eponymous Pickle

Printing all the Science News that Fits

I have been a fan of NYT science writing for years. Enjoyed it and thought it was well written and mostly objective. Yet now, on particularly important topic, they...

Smart as a Cat?
From The Eponymous Pickle

Smart as a Cat?

Just a while back I linked to a press release about how IBM had claimed to have created a brain simulation that had as many neurons and synapses as a cat. WithHere...

Smartbooks vs Notebooks
From The Eponymous Pickle

Smartbooks vs Notebooks

Why carry yet another unitasking device? What ultimately is the difference? Good piece on this. I would personally like it all on a smartphone device, though the...

Evolution of Pepsi vs Coke Logos
From The Eponymous Pickle

Evolution of Pepsi vs Coke Logos

Brought to my attention recently the relative evolution of Pepsi vs Coke Logos. It was later pointed out to be that this is somewhat selectively inaccurate, yet...

An Undervalued Math Problem
From Computational Complexity

An Undervalued Math Problem

As most of you know there are 7 problems worth $1,000,000 (see here). It may be just 6 since Poincare's conjecture has probably been solved. Why are these problems...

Lessons Learned for Science Outreach
From The Female Perspective of Computer Science

Lessons Learned for Science Outreach

I went to my old high school last week to do some outreach for Let's Talk Science. The teacher we're partnered with requested a grade ten physics activity on optics...

Al Qaeda Secret Code Broken
From Schneier on Security

Al Qaeda Secret Code Broken

I would sure like to know more about this: Top code-breakers at the Government Communications Headquarters in the United Kingdom have succeeded in breaking the...

Lining Up
From The Eponymous Pickle

Lining Up

A just discovered blog that covers aspects of queueing theory, both the idealized mathematical aspects and the psychological issues to discover how people relate...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account