Sign In

Communications of the ACM

Blogs


Blogroll


HCIR 2010 Accepted Papers
From The Noisy Channel

HCIR 2010 Accepted Papers

The 4th Workshop on Human-Computer Interaction and Information Retrieval (HCIR 2010) is coming up on August 22 in New Brunswick, NJ, taking place immediately after...

What Online Marketers Know About You
From The Eponymous Pickle

What Online Marketers Know About You

In Flowingdata: What Online Marketers Know About you. I do like the topic, it is something we should be aware of. I am not sure that the graphics add enough to...

UAE to Ban BlackBerrys
From Schneier on Security

UAE to Ban BlackBerrys

The United Arab Emirates -- Dubai, etc. -- is threatening to ban BlackBerrys because they can't eavesdrop on them. At the heart of the battle is access to thecomplicated...

QR Codes get Needed Publicity
From The Eponymous Pickle

QR Codes get Needed Publicity

The square two dimensional QR code, commonly used in Japan, is uncommon in North America. And that is the problem. If people don't know there may be something...

Advances in Vending
From The Eponymous Pickle

Advances in Vending

We did lots of work on kiosk implementations in the innovation centers. I recently talked to a company, Utiqueshop that was doing some interesting things in advanced...

USACM and SIGPLAN Comment on SEC Python Proposal
From U.S. Public Policy Committee of the ACM

USACM and SIGPLAN Comment on SEC Python Proposal

The Securities and Exchange Commission recently issued a request for comments on proposed changes to the rules regulating asset-backed securities. Part of the...

Floating Wind Lens
From The Eponymous Pickle

Floating Wind Lens

From IdeaConnection. The Floating Wind Lens. Improvement in wind power technology?

Retail Realities Column
From The Eponymous Pickle

Retail Realities Column

Evan Schuman, editor of Storefrontbacktalk, points me to their Retail Realities column published every Friday on CBSNews.com. Add it to your feed. Also on Twitter...

Interesting Links August 3 2010
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Interesting Links August 3 2010

You may have noticed that I wasn

Location-Based Quantum Encryption
From Schneier on Security

Location-Based Quantum Encryption

Location-based encryption -- a system by which only a recipient in a specific location can decrypt the message -- fails because location can be spoofed. Now asolved...

Overcoming Spammers in Twitter
From The Noisy Channel

Overcoming Spammers in Twitter

As I blogged a few months ago, University of Oviedo professor Daniel Gayo-Avello published a research paper entitled “Nepotistic Relationships in Twitter and their...

Mobile youth activism around the world
From Putting People First

Mobile youth activism around the world

A couple of years ago I wrote about Mobile Revolutions, a blog about mobile phones, youth and social change by Lisa Campbell Salazar. The blog also supported TakingITMobile...

Future of Social Gaming
From The Eponymous Pickle

Future of Social Gaming

In the Recorded Future blog, a post about an analysis of the future of social gaming this is a nice example of the use of the novel Recorded Future predictive approach...

Eavesdropping Smartphone Apps
From Schneier on Security

Eavesdropping Smartphone Apps

Seems there are a lot of them. They do it for marketing purposes. Really, they seem to do it because the code base they use does it automatically or just because...

Is the
From Wild WebMink

Is the

I was pleased to be able to attend this year’s OSCON, O’Reilly Media’s open source convention held once again in Portland, Oregon in mid-July. There have been numerous...

Rapportive Contact List Management
From The Eponymous Pickle

Rapportive Contact List Management

I just took a look at the Rapportive Rich Contact resource add on to the Chrome browser. It works with the GMail service only. It will not work with the Explorer...

Internet Time Budgets
From The Eponymous Pickle

Internet Time Budgets

Not unexpected, and here social networks are including blogs, which is also blogs, broadly defined to include newsfeeds. Not necessarily including any actual social...

Hill Tech Happenings, Week of August 2
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of August 2

The House is presently on recess until after Labor Day, and the Senate is scheduled to join them by the weekend. August 4 (Continues to noon on August 6) The Information...

Fixing the Computer Science Problem with an Act of Congress
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Fixing the Computer Science Problem with an Act of Congress

Bills get written and submitted to Congress without getting passed all the time but if nothing else the process often gets the discussion going. A recent bill to...

From Computational Complexity

I want your intuitions on this, so the less you know the more I want you to post

Let f(n) be a monotone increasing function from N to N. (CLARIFICATION ADDED LATER: N is the naturals.) Consider the following game: Let n be a natural number...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo