Sign In

Communications of the ACM

Blogs


Blogroll


From Computational Complexity

A Post on the Post Post

On Monday Richard Lipton wrote a nice piece on the work of Emil Post, a famous logician who had great results and even greater questions in the early days of recursion...

The Tesco as a New Measurement
From The Eponymous Pickle

The Tesco as a New Measurement

In the BBC: UK retailer positions the Tesco as a new unit of measurement.-

How Google and Facebook are Using R
From The Eponymous Pickle

How Google and Facebook are Using R

The techniques described are not new, but very much worthwhile for anyone hoping to do predictive analytics.

Autonomous Display Concept
From The Eponymous Pickle

Autonomous Display Concept

What seems like an outrageous new concept: What's next after a flat display? Something completely different:" ... Designer Julia Tsao presented a seemingly outlandish...

The Doghouse: Lock My PC
From Schneier on Security

The Doghouse: Lock My PC

Lock My PC 4 has a master password.

Delta: An Unworkable Consumer Model
From The Eponymous Pickle

Delta: An Unworkable Consumer Model

Doug Lautzenheiser posts about a recent experience he had with up-charges by Delta Airlines. I have now flown out of Cincinnati for thirty-three years. Traveling...

The Thought Bank
From The Eponymous Pickle

The Thought Bank

Just brought to my attention via Steve King: The Thought Bank:' ... Our mission is to help companies become more effective thought leaders and increase their visibility...

More to Networking than Social Networking
From The Eponymous Pickle

More to Networking than Social Networking

Social networking has taken off in many forms over the past few years. It works in the sense that connections that were difficult in the past can now be made and...

Random Links for the Day
From My Biased Coin

Random Links for the Day

FemaleScienceProfessor tells an Evil Reviewer story. The CRA blog tells us that DARPA is back, in terms of funding university research.  Ed Lazowska has related...

Booby-trapping a PDF File
From Schneier on Security

Booby-trapping a PDF File

Interesting.

A new age of user-repaired devices
From Putting People First

A new age of user-repaired devices

iFixit launched today today a

Better tech docs through social networking
From Putting People First

Better tech docs through social networking

The social networking phenomenon has ushered in a shift in mindset that, in turn, has driven people to become actively engaged in generating their own content and...

A Report from the Visions and Grand Challenges Conferences
From The Computing Community Consortium Blog

A Report from the Visions and Grand Challenges Conferences

Your faithful correspondent recently attended the paired ACM-BCS Visions of Computer Science 2010 and UKCRC Grand Challenges conferences at Edinburgh University...

Hyper Realism
From The Eponymous Pickle

Hyper Realism

Intriguing Wired report on a new faster graphics methodology that directly utilizes voxels, the 3D equivalent of pixels. Look forward to the possibilities for their...

April 2010 issue of Boxes and Arrows
From Putting People First

April 2010 issue of Boxes and Arrows

The April issue of Boxes and Arrows is recommended reading: Designing for social interaction – strong, weak and temporary ties by Paul Adams, senior UX researcher...

links for 2010-04-22
From Wild WebMink

links for 2010-04-22

WhiteHouse.gov Releases Open Source Code Delighted to see Obama's White House releasing their work as open source – way to go. (tags: Obama OpenSource FOSS USA...

US Imagine Cup Finals This Weekend
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

US Imagine Cup Finals This Weekend

Today I have a presentation to give around mid-day and then I go  home to pack for a trip to Washington DC for the US finals of the Imagine Cup. Ironically last...

NIST on Protecting Personally Identifiable Information
From Schneier on Security

NIST on Protecting Personally Identifiable Information

Just published: Special Publication (SP) 800-122, "Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)." It's 60 pages long; I...

From Computational Complexity

P and NP: A Short Movie

YouTube Link

Visa to Buy Cybersource
From The Eponymous Pickle

Visa to Buy Cybersource

In StorefrontBacktalk: Visa buys more than a security company for 2 billion. Comments on its being more than just a security company play. See also Cybersource's...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo