acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

On Bad Graphs
From The Eponymous Pickle

On Bad Graphs

Stephen Few on bad graphs in Information Management Magazine. I see it is a bit dated now, but still worth reviewing. Bad visualizations are very common. I have...

ThisweKnow
From The Eponymous Pickle

ThisweKnow

I had taken a look at the government database data.gov when it came out earlier this year. Now there is a semantic database use case for this data called Thisweknow...

The Role of Analysis in Invention
From The Eponymous Pickle

The Role of Analysis in Invention

The role of statistical analysis in invention, by Felix Grant. Analysis as the mother of invention. Thoughtful piece.

Gordon Bell's Mylifebits
From The Eponymous Pickle

Gordon Bell's Mylifebits

BW reviews the status of the work by Gordon Bell with MyLifebits. Inspired in part by Vennevar Bush's unimplemented Memex idea. We saw MyLifebits presented in its...

Venture Capital Industry
From The Eponymous Pickle

Venture Capital Industry

Whats Really Happening to the Venture Capital Industry?. ' ... It is indeed quite likely that the venture industry is in the process of a very substantial reduction...

John Battelle:
From The Noisy Channel

John Battelle:


Not All Google Critics Are Bigots
From The Noisy Channel

Not All Google Critics Are Bigots


The other side of the table: Bryan Cantrill
From Return 42;

The other side of the table: Bryan Cantrill

It is already time for next one. I actually can't believe how fast the time was passing by, which is probably caused by the amount of work I had to do in the past...

Friday Squid Blogging: Squid Coloration
From Schneier on Security

Friday Squid Blogging: Squid Coloration

Fascinating video.

links for 2009-09-04
From Wild WebMink

links for 2009-09-04

EU fears Oracle will kill MySQL, but is that even possible? So many speculaitive stories out there, all full of half-correct opinions...

links for 2009-09-04
From Wild WebMink

links for 2009-09-04

Gov 2.0: It

Revealing Slant in Mathematica
From The Eponymous Pickle

Revealing Slant in Mathematica

Jilyan Landon of Mathematica points me to a post in the Wolfram Blog. There something as mundane as an error message gives a hint to how well integrated Mathematica...

Advising Government on a New Key Piece of Legislation
From Computer Science Teachers Association

Advising Government on a New Key Piece of Legislation

In early August, the U.S. Department of Education released the proposed structure of the $4.5 billion Race to the Top Fund. In short, this fund will distribute...

Lecture on Human-Computer Interaction and Public Policy
From U.S. Public Policy Committee of the ACM

Lecture on Human-Computer Interaction and Public Policy

Event Date: September 21, 2009 The Washington DC Chapter of the Association for Computing Machinery, with support from the New America Foundation, will hold a...

HCIR: Better Than Magic!
From The Noisy Channel

HCIR: Better Than Magic!


Reaching Out and OutreachAmbassador: Mary Anne Egan, United States
From ACM-W supporting, celebrating and advocating for Women in Computing

Reaching Out and OutreachAmbassador: Mary Anne Egan, United States

There are several projects keeping me busy this year. First, the Student IMPACT alternative programming contest continues (www.cs.siena.edu/~maegan/impact). The...

Internet at 40
From The Eponymous Pickle

Internet at 40

I was pleased to have been involved in some of the early use of the Internet in the testing of remote Darpanet systems. It about to be 40 years old. CW makes some...

Changing your perspective: horizontal, vertical and hybrid data models
From Daniel Lemire's Blog

Changing your perspective: horizontal, vertical and hybrid data models

Data has natural layouts: text is written from the first to the last word, database tables are written one row at a time, Google presents results one document...

Subpoenas as a Security Threat
From Schneier on Security

Subpoenas as a Security Threat

Blog post from Ed Felten: Usually when the threat model mentions subpoenas, the bigger threats in reality come from malicious intruders or insiders. The biggest...

SODA list up
From My Biased Coin

SODA list up

As announced everywhere, the list of SODA papers is up.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account