acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Hill Tech Happenings, Week of October 5
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of October 5

October 7 Meeting: The Information Security and Privacy Advisory Board will meet. The focus of the meeting will be on the NIST Information Technology Laboratory...

Job Competitions
From My Biased Coin

Job Competitions

Stefan Savage made an insightful comment related to the issue of jobs: I've long felt that its a fallacy that there exists a fine-grained Platonic ideal of "goodness"...

Links for 2009-10-05
From Wild WebMink

Links for 2009-10-05

The Cybersecurity Myth Cringely on why the US claim to be in the process of hiring 1,000 "cybersecurity experts" is unlikely to impress any real...

Actual DHS Travel Record
From Schneier on Security

Actual DHS Travel Record

If you were curious what the DHS knows about you.  

The Other Side of the Table: Lawrence Paulson
From Return 42;

The Other Side of the Table: Lawrence Paulson

This post in the The other side of the table series is one week late. Sorry for that. As I have mentioned earlier, it is a quite busy time for me at the moment....

Paid Traffic Down
From The Eponymous Pickle

Paid Traffic Down

Paid online traffic appears to be down about 26%, A very cursory look at the data looks like it is a significant change beyond normal and seasonal variability....

Soap Opera Moving Online
From The Eponymous Pickle

Soap Opera Moving Online

Dave Knox posts on new experiments by Procter with online soap. Links to another local article on the change. Outlines some of P&G's goals. One of the world's largest...

Pirating Books Expands
From The Eponymous Pickle

Pirating Books Expands

With the emergence of popular book readers will will we start to see increasing book piracy? In the NYT ' .... The Association of American Publishers estimated...

Singularity
From The Eponymous Pickle

Singularity

Artificial intelligence and consciousness at the singularity summit. This is still a long ways off-

Counting on Dividends for 119 Years
From The Eponymous Pickle

Counting on Dividends for 119 Years

I worked on a project that helped Procter executives relate and visualize compensation to dividends. It was the first PC based program that execs used directly....

What About the Other 11 Months?
From CERIAS Blog

What About the Other 11 Months?

October is "officially" National Cyber Security Awareness Month. Whoopee! As I write this, only about 27 more days before everyone slips back into their cyber stupor...

The shift from human-centered to resource-centered design
From Putting People First

The shift from human-centered to resource-centered design

Eric Wilmot writes on Greener Design on how to design for a post-consumption society. And an excellent article it is. “The current interpretation of human-centered...

It
From Putting People First

It

When companies develop innovative products that don

"Core" TCS
From My Biased Coin

"Core" TCS

Enough time has perhaps passed from Mihai's controversial post to consider, constructively I hope, some of the comments that arose here on this blog from it.One...

Quick Latitudes and Longitudes
From The Eponymous Pickle

Quick Latitudes and Longitudes

Download Squad mentions a little mashup utility that lets you quickly get latitudes and longitudes for a place name. Used it some time ago and was glad to be reminded...

Google Challengers
From The Eponymous Pickle

Google Challengers

Good Businessweek piece : Can Google Stay on Top of the Web? As Bing, Facebook, Twitter and less well-known upstarts nip at its heels, Google has hundreds of wizards...

Software Patents: A Personal Story
From The Noisy Channel

Software Patents: A Personal Story


Alternatives to the CKO
From The Eponymous Pickle

Alternatives to the CKO

In his blog Mark Montgomery discusses alternatives to the CKO (Chief Knowledge Officer) One of the comments in the thread there points to the fact that there are...

Friday Squid Blogging: Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Squid Cartoon

Lio.

Sensible hashing of variable-length strings is impossible
From Daniel Lemire's Blog

Sensible hashing of variable-length strings is impossible

Consider the problem of hashing an infinite number of keys
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account