Sign In

Communications of the ACM

Blogs


Blogroll


NCWIT Award for Aspirations in Computing 2010
From Computer Science Teacher Thoughts and Information From Alfred Thompson

NCWIT Award for Aspirations in Computing 2010

I really like this award program so I am happy to promote it on my blog. The following is from the official announcement. I strongly encourage you to share this...

Friday Squid Blogging: Squid Eyes
From Schneier on Security

Friday Squid Blogging: Squid Eyes

Squid eyes.

Social Tech Retail Value.
From The Eponymous Pickle

Social Tech Retail Value.

An interesting early experiment with a restaurant using social technology. Did McDonald's get a 33% increase in foot traffic from Foursquare? ReadWriteWeb looks...

Google Scribe
From The Eponymous Pickle

Google Scribe

This Google writing capability fills in phrases for you. Generally a reasonable idea, but can also be annoying unless you are used to it. -

Master HDCP Key Cracked
From Schneier on Security

Master HDCP Key Cracked

The master key for the High-Bandwidth Digital Content Protection standard -- that's what encrypts digital television between set-top boxes and digital televisions...

Can Science be wrong? You bet!
From Daniel Lemire's Blog

Can Science be wrong? You bet!

A common answer to my post on the reliability of science, was that fraud was marginal and that, ultimately, science is self-correcting. That is true on one condition...

Automatic Document Declassification
From Schneier on Security

Automatic Document Declassification

DARPA is looking for something that can automatically declassify documents: I'll be honest: I'm not exactly sure what kind of technological solution you can build...

Thoughts on Writing My First CHI Paper
From The Female Perspective of Computer Science

Thoughts on Writing My First CHI Paper

I've been working on a paper for CHI2011, one of the (or the?) top conferences in human computer interaction. I'm aiming really high with this and know full well...

Liespotting
From The Eponymous Pickle

Liespotting

An interesting article on detecting lies in conversations. The article makes the case that there is currently an epidemic of deception. Everyone wants to know...

Billion in Digital Book Sales
From The Eponymous Pickle

Billion in Digital Book Sales

Barnes & Noble expects to have a billion dollars in digital book sales by 2013. Another example of the changes from paper to digital format. Get your readers ready...

Pex for Fun
From Computer Science Teacher Thoughts and Information From Alfred Thompson

Pex for Fun

Can you read code in C#, F# or Visual Basic? Do you like programming puzzles we (well the Pex Team, part of the Research in Software Engineering (RiSE) groupMicrosoft...

Context-aware devices that become our natural extensions
From Putting People First

Context-aware devices that become our natural extensions

Much coverage on the presentation by Justin Rattner, Intel’s CTO at the Intel Developer Forum, where he discussed a future with so-called context-aware computers...

The relationship revolution
From Putting People First

The relationship revolution

The Internet may seem like a 21st-century nightmare version of the worst excesses of the marketplace, writes Melinda Blau in the Psychotherapy Networker. But it’s...

Myths and Truths About Innovation
From The Eponymous Pickle

Myths and Truths About Innovation

Mark Montgomery of Kyield posts on Myths and Truths about Innovation. Something he has been working on for some time. " ... In my daily filtering of news and intelligence...

Mapping Remarkable Relationships
From The Eponymous Pickle

Mapping Remarkable Relationships

Colleague Julie Anixter video on her new Youtube presence:On Mapping Remarkable Relationships: Four Seasons The essence of every great customer experience is a...

? Copyright Aggregation Essay
From Wild WebMink

? Copyright Aggregation Essay

My essay on copyright aggregation in open source projects has finally moved to the Essays section of the web site; future updates and edits will happen there.

Computer Science and Reading Literacy
From Computer Science Teachers Association

Computer Science and Reading Literacy

Recently, my school received their results from the high stakes testing in our state. While my school maintained the Excellent rating for the fifth year in a row...

From Computational Complexity

Should You Mentor High School Students?

I have mentored many high school students on projects (21 in the past, 6 right now). Is this a good use of ones time? I note my experiences and advice- if you have...

Social Media Campaigns
From The Eponymous Pickle

Social Media Campaigns

In Mashable, a good set of case studies of social media campaigns. " ... A great social marketing campaign can be hard to describe; sometimes it's better just...

DHS <i>Still</i> Worried About Terrorists Using Internet Surveillance
From Schneier on Security

DHS Still Worried About Terrorists Using Internet Surveillance

Profound analysis from the Department of Homeland Security: Detailed video obtained through live Web-based camera feeds combined with street-level and direct overhead...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo