acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Going (to) Google
From The Noisy Channel

Going (to) Google


Interview with Me
From Schneier on Security

Interview with Me

On CNet.com

Metagenomics and the Computing Challenges of Microbial Communities
From The Computing Community Consortium Blog

Metagenomics and the Computing Challenges of Microbial Communities

Why should you care about microbial communities? Except for viruses, they are the most abundant life on Earth and have an overwhelming effect on our environment...

Near Real-Time Flu Tracking at CDC
From The Eponymous Pickle

Near Real-Time Flu Tracking at CDC

I was involved with a project that sought to use retail data to do something similar. With the potential to use it for epidemics or bioterror detection and tracking...

Limits of Social Media Marketing
From The Eponymous Pickle

Limits of Social Media Marketing

A cautious piece about social media marketing. Its more than just starting up a free presence and expecting people to engage.

Entrpreneurial Resources
From The Eponymous Pickle

Entrpreneurial Resources

Useful: In Inc. Top Entrepreneurial bloggers and in Mashable: useful tools for Entrepreneurs.

IBM Sets up Indian Analytics Center
From The Eponymous Pickle

IBM Sets up Indian Analytics Center

In my early days in the enterprise we worked directly with IBM to use their optimization software and resources to solve tough analytics problems. Over the years...

From Computational Complexity

Button Button

Here is the offer: If you press the button you will receive $200,000. The caveat: Someone you don't know will die. I was born during run of the original Twilight...

FOCS/STOC and Asymmetry
From My Biased Coin

FOCS/STOC and Asymmetry

I had a funny conversation with Madhu Sudan yesterday, with him relaying an idea he said he heard from Umesh Vazirani (and perhaps the trail goes on further from...

The Doghouse: ADE 651
From Schneier on Security

The Doghouse: ADE 651

A divining rod to find explosives in Iraq: ATSC’s promotional material claims that its device can find guns, ammunition, drugs, truffles, human bodies and even...

Harvard Financial Aid
From My Biased Coin

Harvard Financial Aid

This post will talk about Harvard's financial aid program, and why it's a perfectly good thing to give money to Harvard, despite what you might read in the New.I...

Computer Science in Practice
From Computer Science Teachers Association

Computer Science in Practice

Seen in the stairwell of the Purdue Student Health Center... Robb Cutler CSTA Past President

Internet Choice Perception
From The Eponymous Pickle

Internet Choice Perception

From O'Reilly: ' ... Individual perception of increased choice can occur while the overall choice pool is getting smallerThis gem from Whimsley makes the point...

Reading and Augmented Reality
From The Eponymous Pickle

Reading and Augmented Reality

An upcoming issue of Esquire plans to include a number of readable Q codes. So Engadget suggests that this is augmenting reality. It is augmenting reading, and...

Reinventing British manners the Post-It way
From Putting People First

Reinventing British manners the Post-It way

Wired UK asked Bill Moggridge and his IDEO team to tackle the urban rage problem that is rendering the UK cityscapes ever more aggressive. “Design thinking defines...

Social isolation and new technology
From Putting People First

Social isolation and new technology

The Pew Internet Personal Networks and Community survey finds that Americans are not as isolated as has been previously reported. People

Strength in science collaboration
From Putting People First

Strength in science collaboration

Rory Cellan-Jones of BBC News reports on how Google Wave is proving its worth in the scientific community, as one of the new collaboration tools which scientists...

Grad School Time Management
From The Female Perspective of Computer Science

Grad School Time Management

Grad school's different from pretty much all school before it.In high school, everything was very structured, with the same classes happening every day. You always...

From Computational Complexity

Innovation

The new Innovations in Computer Science conference announced their accepted papers earlier this week including my paper with Rahul Santhanam "Bounding Rationality...

The Problems with Unscientific Security
From Schneier on Security

The Problems with Unscientific Security

From the Open Access Journal of Forensic Psychology, by a whole llist of authors: "A Call for Evidence-Based Security Tools": Abstract: Since the 2001 attacks...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account