Sign In

Communications of the ACM

Blogroll



Five similarities between collaborative consumption and open-source technology
From Putting People First

Five similarities between collaborative consumption and open-source technology

Tim Hyer, the founder of Rentcycle (an online rental marketplace for those looking to share access rather than retain ownership), was hugely inspired by his previous...

From The Computing Community Consortium Blog

This following a special contribution to this blog by Cindy L. Bethel, a 2009 Computing Innovation Fellow (CIFellow) working with Brian Scassellati in the Social...

From Computational Complexity

Partioning Students

One last Molly post for the end of the school year. Tomorrow is her birthday and I enter that moment I have been dreading for the past thirteen years: Two teenage...

Archiving Everything
From The Eponymous Pickle

Archiving Everything

Remembering being surprised in 2010 that the US Library of Congress was archiving Twitter.   Lots of details about that effort here.  So many data mining opportunities...

Man-in-the-Middle Attack Against the MCAT Exam
From Schneier on Security

Man-in-the-Middle Attack Against the MCAT Exam

In Applied Cryptography, I wrote about the "Chess Grandmaster Problem," a man-in-the-middle attack. Basically, Alice plays chess remotely with two grandmasters...

Crowd Sourced Eyetracking
From The Eponymous Pickle

Crowd Sourced Eyetracking

A look at YouEye ... An interesting concept that is likely very cheap. But what will the quality be like? Tracks using your own camera for user interface design...

Touchscreen vs Heavy Lifting OS
From The Eponymous Pickle

Touchscreen vs Heavy Lifting OS

A look at touchscreen as an interface versus full operating systems. Praises an early look at Windows 8, but says it cannot match the simplicity of an iPad. But...

Ford's Cars to Talk to Each Other
From The Eponymous Pickle

Ford's Cars to Talk to Each Other

GigaOm report on development of technology by Ford to allow cars to talk to each other and avoid crashes and otherwise cooperate.  Cooperative autonomy is interesting...

MindBox
From The Eponymous Pickle

MindBox

Met today with Jeff Dyck of Mindbox Studios.  They have done some very interesting things, including some intriguing work with nonprofits.  Emphasis on symbolic...

Take Virtual Chef Training
From The Eponymous Pickle

Take Virtual Chef Training

Be a virtual Top Chef.  Take the basic training. An example of entertainment based online games.  Not particularly engaging to me, though I am a foodie, but this...

Justin's Poster at FCRC
From My Biased Coin

Justin's Poster at FCRC

Justin Thaler, a student I'm advising (or, quite arguably, the other way around), will be at the poster session for STOC, ready to talk about a bunch of his currently...

NSF Seeking Proposals With
From The Computing Community Consortium Blog

NSF Seeking Proposals With

The NSF’s CISE and Biological Sciences (BIO) directorates have joined forces to seek interdisciplinary proposals that further the frontiers of both fields. In a...

So You Want To Teach Your Kids To Program?
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

So You Want To Teach Your Kids To Program?

In all honestly I tend to avoid Slashdot. Oh I scan it for the news from time to time but I work hard at avoiding the comments and avoid the Q&A forums. Why? The...

Designing Pleasurable Products and Interfaces conference
From Putting People First

Designing Pleasurable Products and Interfaces conference

DPPI 11, the 5th conference on Designing Pleasurable Products and Interfaces, will take place in Milan at the end of this month, with Experientia partner Mark Vanderbeeken...

ICT in Abu Dhabi
From Computer Science Teachers Association

ICT in Abu Dhabi

I am lucky enough to be situated in a school in the Abu Dhabi emirate (in a town called Al Ain) for 12 weeks. Although I work as a Math advisor, I talk to a number...

Three-Volume History of Counterintelligence
From Schneier on Security

Three-Volume History of Counterintelligence

CI Reader: An American Revolution Into the New Millennium, Volumes I, II, and III is published by the U.S. Office of the National Counterintelligence Executive....

Make Every e-Book a Social Network
From The Eponymous Pickle

Make Every e-Book a Social Network

Thoughts about turning an e-book into a social reading network.  Makes sense, though I wonder how often people will interact in this way.  Comments on the books...

Magazines Rush to the Pads
From The Eponymous Pickle

Magazines Rush to the Pads

Is it based on Insanity and Fear?  And will it take decades to complete?  An AdAge interview looks at the implications.  I think there will be dual channels for...

From Computational Complexity

RaTLoCC (Ramsey Theory in...)

I was at RatLoCC last week which stands for Ramsey Theory in Logic, Combinatorics and Complexity. The idea was to bring in researchers for all three areas (actually...

The U.S. Seems to Have a Secret Stealth Helicopter
From Schneier on Security

The U.S. Seems to Have a Secret Stealth Helicopter

That's what the U.S. destroyed after a malfunction in Pakistan during the Bin Laden assassination. (For helicopters, "stealth" is less concerned with radar signatures...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo