acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The other side of the table: Limsoon Wong
From Return 42;

The other side of the table: Limsoon Wong

Professor and Head of Computer Science of the School of Computing at the National University of Singapore. Before that, he was the Deputy Executive Director for...

links for 2009-11-26
From Wild WebMink

links for 2009-11-26

Closures for Java "Revising a programming language that

"Verified by VISA": Still Using SSNs Online, Dropped by PEFCU
From CERIAS Blog

"Verified by VISA": Still Using SSNs Online, Dropped by PEFCU

I have written before about the "Verified by VISA" program. While shopping for Thanksgiving online this year, I noticed that Verified by Visa scripts were blocked...

Marti Hearst: Tech Talk on Search User Interfaces
From The Noisy Channel

Marti Hearst: Tech Talk on Search User Interfaces


Happy Holidays
From Computer Science Teachers Association

Happy Holidays

The end of the year brings upon us the celebrations that come with the holidays. This year, we have extra reason to celebrate with an added holiday. The week of...

PASS ID Moves Forward in Congress
From U.S. Public Policy Committee of the ACM

PASS ID Moves Forward in Congress

PASS ID, S. 1261, is a bill introduced in June as an attempt to break through the impasse over REAL ID. That law, passed as part of a budget bill in 2005, was...

Acquisitions as Retail Geography
From The Eponymous Pickle

Acquisitions as Retail Geography

A BNet article that looks at P&G past acquisitions, and speculates about future M&A in terms of retail space coverage. I like the idea of understanding products...

Mumbai Terrorist Attacks
From Schneier on Security

Mumbai Terrorist Attacks

Long, detailed, and very good story of the Mumbai terrorist attacks of last year. My own short commentary in the aftermath of the attacks.

IBM Crowdsourcing
From The Eponymous Pickle

IBM Crowdsourcing

An instructive piece on how IBM sources skills to a job. Requires registration. -

Learning with Serious Games
From The Eponymous Pickle

Learning with Serious Games

On learning through games and simulations. ' ... Karl Kapp, professor, author and speaker, understands the value of games and simulations in learning. In this...

Drawing as Thinking
From The Eponymous Pickle

Drawing as Thinking

David Sibbet passes along a link to a video by Milton Glaser on drawing as another form of thinking.

From Computational Complexity

Birthday Paradox Variance

First a message from David Johnson for proposals on locations for SODA 2012 both in and outside the US. Here's an interesting approach to the birthday paradox...

Embracing an Innovation
From The Eponymous Pickle

Embracing an Innovation

A timely piece in Knowledge@Wharton on choosing innovations. Something we and all enterprises struggled with under the topic of knowledge management and portfolio...

Virtual Mafia in Online Worlds
From Schneier on Security

Virtual Mafia in Online Worlds

If you allow players in an online world to penalize each other, you open the door to extortion: One of the features that supported user socialization in the game...

links for 2009-11-25
From Wild WebMink

links for 2009-11-25

Senators press EU to speed its Oracle-Sun probe US senators, that is. I'm sure the Commission will completely ignore them. (tags: Sun Oracle...

fMRI used in Sentencing
From The Eponymous Pickle

fMRI used in Sentencing

Having just personally experienced my first fMRI, this caught my eye. Apparently the first time that this has been done in a courtroom. Not that the method is being...

Real Code is Messy
From Computer Science Teachers Association

Real Code is Messy

Reading John Harrison's blog of November 3 got me thinking about what I am trying to teach my students in my third-semester (university) course about the development...

Users Rationally Rejecting Security Advice
From Schneier on Security

Users Rationally Rejecting Security Advice

This paper, by Cormac Herley at Microsoft Research, sounds like me: Abstract: It is often suggested that users are hopelessly lazy and unmotivated on securityme...

Run-length encoding (part I)
From Daniel Lemire's Blog

Run-length encoding (part I)

Run-length encoding (RLE) is probably the most important and fundamental string compression technique. Countless multimedia formats and protocols use one form or...

An Extra Piece of Chicken
From The Eponymous Pickle

An Extra Piece of Chicken

I see that Marco Marsan has set up a new site and blog for Marco Polo, his strategic innovation company. So what is this about chicken? See his great story about...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account