Sign In

Communications of the ACM

Blogs


Blogroll


What Do People Want on Smartphones?
From The Eponymous Pickle

What Do People Want on Smartphones?

In Progressive Grocer: What information do people want on their smartphones. This is mostly a fairly obvious survey, with a much too small sample, that is still...

DNSSEC Root Key Split Among Seven People
From Schneier on Security

DNSSEC Root Key Split Among Seven People

The DNSSEC root key has been divided among seven people: Part of ICANN's security scheme is the Domain Name System Security, a security protocol that ensures Web...

Retail Geek
From The Eponymous Pickle

Retail Geek

Just discovered through some Twitter messages The Retail Geek Blog. I have acted in that capacity at times. Welcome.

Mapping the Brain's Networks
From The Eponymous Pickle

Mapping the Brain's Networks

Remarkable overview of work by IBM scientists on mapping the major networks in the brain. With some great visualizations. The most comprehensive work yet in understanding...

Rem Koolhaas, the Hermitage and the design of innovative experiences
From Putting People First

Rem Koolhaas, the Hermitage and the design of innovative experiences

On the way to celebrating its 250th anniversary in 2014, the Hermitage museum in St. Petersburg (formerly the Winter Palace of the Russian czars) hired legendary...

SIGIR 2010: Day 3 Industry Track Afternoon Sessions
From The Noisy Channel

SIGIR 2010: Day 3 Industry Track Afternoon Sessions

While the SIGIR 2010 Industry Track keynotes had the highest-profile speakers, the rest of the day assembled an impressive line-up: The new frontiers of Web search...

Cory Doctorow on curated computing
From Putting People First

Cory Doctorow on curated computing

Cory Doctorow, the Canadian blogger, journalist and science-fiction author, argues in The Guardian that curated computing is no substitute for the personal and...

Time to break the cyber-utopian myth
From Putting People First

Time to break the cyber-utopian myth

Who do you read and associate with online? Ethan Zuckerman argues in this Guardian video that cultural and linguistic barriers stand in the way of our using the...

Amazon Sells Groceries in the UK
From The Eponymous Pickle

Amazon Sells Groceries in the UK

In Businessweek: Amazon sells groceries online in the UK. " ... has launched a grocery website in Britain, offering customers products from companies including...

EdChat Education Discussions on Twitter
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

EdChat Education Discussions on Twitter

Have you ever wondered what good Twitter was for educators? Well #EdChat is one thing that is very useful. And pretty interesting as well. EdChat is an informal...

Pork-Filled Counter-Islamic Bomb Device
From Schneier on Security

Pork-Filled Counter-Islamic Bomb Device

Okay, this is just weird: Mark S. Price, a specialist in public security, and his privately held company, Paradise Lost Antiterrorism Network of America (www.plan...

From Computational Complexity

This Post is Quite Different then Any You've Every Read!

I recently a letter from WETA (public TV) which I quote from: This letter is quite different from any we've ever sent to you. For years we wrote to you about...

Wrong Price Penalties
From The Eponymous Pickle

Wrong Price Penalties

In StoreFrontBackTalk, an article on some recent large penalties due to incorrect price postings at Sears. You will recall we did a number of studies of Electronic...

Getting Strategic Transparency
From The Eponymous Pickle

Getting Strategic Transparency

On linking transparency and accountability, in particular about using our increasingly sensor-rich world. in the HBR: " ... Whether morbidly curious or voyeuristically...

Insects and Robot Design
From The Eponymous Pickle

Insects and Robot Design

In the CACM: Insects that inspire robot design. Not a new thing. Useful but sometimes overemphasized. Airplanes are not based on the design of birds. Natural inspired...

links for 2010-07-27
From Wild WebMink

links for 2010-07-27

EFF Wins New Legal Protections for Video Artists, Cell Phone Jailbreakers, and Unlockers Congratulations to the EFF on this victory for digital liberty. We mustn't...

WPA Cracking in the Cloud
From Schneier on Security

WPA Cracking in the Cloud

It's a service: The mechanism used involves captured network traffic, which is uploaded to the WPA Cracker service and subjected to an intensive brute force cracking...

Teaching Time Conflicts
From My Biased Coin

Teaching Time Conflicts

As the semester ominously approaches, we've noticed that we're facing a number of class time-slot collisions in computer science.This is unsurprising.  Until recently...

Mind Melds as Measures
From The Eponymous Pickle

Mind Melds as Measures

From Wired, this is interesting ... with perhaps some lessons to neuromarketing. A stronger mild meld might be the connection between two speakers, rather than...

PLDI
From The Computing Community Consortium Blog

PLDI

The Computing Community Consortium is interested in stimulating the development of new research visions and challenges in computing research. Recently, the CCC...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo