Sign In

Communications of the ACM

Blogs


Blogroll


UxSuite Discovers Unforseen Usage Patterns
From The Eponymous Pickle

UxSuite Discovers Unforseen Usage Patterns

Colleague Aylin Koca of the TU/e Department of Industrial Design reports on the establishment of her startup: UXsuite. See some of her previous work posted onWhat...

Unilever Plans to Double Digital Spending
From The Eponymous Pickle

Unilever Plans to Double Digital Spending

In Adage: " ... Unilever will double spending on digital marketing this year, Chief Marketing Officer Keith Weed said in a seminar today at the International Advertising...

Tom Davenport's Masterclass
From The Eponymous Pickle

Tom Davenport's Masterclass

In SASCOM a good report on Tom Davenport's Masterclass. Nicely done, though not too much more than an outlne. Recall that Davenport used our enterprise analytics...

Java Genius
From Wild WebMink

Java Genius

This is a work of genius: The conference, JavaZone in Norway, deserves every bit of the attention it’s getting as a consequence.

Friday Squid Blogging: Vampire Squid
From Schneier on Security

Friday Squid Blogging: Vampire Squid

The vampire squid can turn itself inside out to avoid predators.

Tobii Glasses Announced
From The Eponymous Pickle

Tobii Glasses Announced

Nicely done, in particular the visual business intelligence that is included. See the short video in the link below for a demonstration. " ... Tobii Glasses ?

Hacker Scare Story
From Schneier on Security

Hacker Scare Story

"10 Everyday Items Hackers Are Targeting Right Now" 5. Your Blender. Yes, Your Blender That's right: your blender is under attack! Most mixers are self-contained...

Essays on service design in higher education
From Putting People First

Essays on service design in higher education

COTEN, the collaborative online research project exploring service design for higher education in 2010, features some interesting lecture essays: Small change and...

Connecting Computer Science: Results
From The Female Perspective of Computer Science

Connecting Computer Science: Results

My course is now over, the feedback via my informal survey is rolling in, and students are working out all the kinks in their knowledge as they prepare for theConnecting...

Taking On Personal Assistants
From The Computing Community Consortium Blog

Taking On Personal Assistants

Last week it was Jeopardy! superstar Ken Jennings who was facing competition. This week it’s assistants everywhere. In the second in a fascinating series of articles...

Social Media and Small Business
From The Eponymous Pickle

Social Media and Small Business

Useful short piece in E-Commerce Times:" ... So how can something with that much influence be easy and unintimidating for a small-business owner to use? There's...

? Science Fiction Made Real
From Wild WebMink

? Science Fiction Made Real

No Sleep ‘Til Fusion Wonderfully written story from Quinn about low-budget experimentation with fusion reactions. (tags: Fusion Energy Science Story) Live map of...

Security Trade-Offs in Crayfish
From Schneier on Security

Security Trade-Offs in Crayfish

Interesting: The experiments offered the crayfish stark decisions -- a choice between finding their next meal and becoming a meal for an apparent predator. In...

Risky Behaviors and Online Safety: A 2010 Literature Review
From Apophenia

Risky Behaviors and Online Safety: A 2010 Literature Review

I’m pleased to announce a rough draft of Risky Behaviors and Online Safety: A 2010 Literature Review for public feedback. This Literature Review was produced for...

Kodu Game Lab - Classroom Kit
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Kodu Game Lab - Classroom Kit

The Kodu team has just released a classroom kit of Kodu resources. If you are thinking about using Kodu either in a summer program or with students in the fall...

Bad Times and Good Times in Georgia
From Computer Science Teachers Association

Bad Times and Good Times in Georgia

It has been a hard year for computing teachers in Georgia. Many school districts are operating with reduced budgets and have cut teachers. Even though Georgia...

Geofencing
From The Eponymous Pickle

Geofencing

Geofencing is a kind of virtual alert system based on a geographical line or lines drawn on a map. So if you wanted to determine if a person entered a particular...

This Blog and How it Relates to What I Do
From The Eponymous Pickle

This Blog and How it Relates to What I Do

This blog in various forms was initially established to communicate to innovation center visitors starting around 2002. This blog's readers include executives and...

TacSat-3 "Hyperspectral" Spy Satellite
From Schneier on Security

TacSat-3 "Hyperspectral" Spy Satellite

It's operational: The idea of hyperspectral sensing is not, however, merely to "see" in the usual sense of optical telescopes, infrared nightscopes and/or thermal...

WikiLeaks
From Schneier on Security

WikiLeaks

Long, but interesting, profile of WikiLeaks's Julian Assange from The New Yorker. Assange is an international trafficker, of sorts. He and his colleagues collect...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo