Sign In

Communications of the ACM

Blogroll



We Can Store it, but can we Effectively Think about it?
From The Eponymous Pickle

We Can Store it, but can we Effectively Think about it?

Cheap storage now allows us to store all that occurs in the Web.  I have worked on projects that include using things like the Internet Archive to understand the...

Me on Cyberwar
From Schneier on Security

Me on Cyberwar

Last week, I gave a talk on cyberwar and cyberconflict at the Institute for International and European Affairs in Dublin. Here's the video. It was only the second...

The future of social networking
From The Computing Community Consortium Blog

The future of social networking

To Facebook message or to e-mail? Facebook message. At least that was the conclusion of a

Artigos em Portugu
From Wild WebMink

Artigos em Portugu

Iniciando um esfor

GMA Rolls out New Site and Blog
From The Eponymous Pickle

GMA Rolls out New Site and Blog

The Grocery Manufacturers Association (GMA) now has a new site and blog.  My enterprise was a member and attended a number of their webinars, seminars and conferences...

Web 2.0 for Supplier Collaboration at Procter
From The Eponymous Pickle

Web 2.0 for Supplier Collaboration at Procter

Via Consumer Goods Technology ....  Evidence of some excellent developments.Leveraging Web 2.0 Technologies for Improved Enterprise & Supplier CollaborationNovember...

TSA Backscatter X-ray Backlash
From Schneier on Security

TSA Backscatter X-ray Backlash

Things are happening so fast that I don't know if I should bother. But here are some links and observations. The head of the Allied Pilots Association is telling...

Private Agreements Harm Communities
From Wild WebMink

Private Agreements Harm Communities

I pointed yesterday to an interesting comment about contributor agreements attached to a report about Michael Meeks speech a LPC. Another comment to the same article...

Dual Business Intelligence Architectures
From The Eponymous Pickle

Dual Business Intelligence Architectures

Thinking about differing architectures for casual versus power users of business intelligence.  Having worked with executive information systems that needed to...

? Essays Now Creative Commons
From Wild WebMink

? Essays Now Creative Commons

I had a request on Identica to make one of my essays available under a Creative Commons licence so it could be translated. I thought that was such a good idea I’ve...

Anita Borg Memorial Scholarship
From Computer Science Teachers Association

Anita Borg Memorial Scholarship

Many years ago I had the tremendous pleasure of meeting Anita Borg and, although I did not realize it at that time, she had a tremendous impact on my career and...

Analytics is Hot
From The Eponymous Pickle

Analytics is Hot

In the SASCom magazine, analytics is hot in the telecom industry.   You don't have to tell me that, it should be hot everywhere. 

Traditional and Software Architects are Even Closer than You Think
From The Female Perspective of Computer Science

Traditional and Software Architects are Even Closer than You Think

I received a comment on Is a Software Architect Worthy of the Name? via email from Lourens Veen, a software architect for a project at the University of Amsterdam...

Collaboratively Watching Videos
From The Eponymous Pickle

Collaboratively Watching Videos

Download squad shows a way to watch a video with friends using Youtube Social.  I can see this also being used to rate a commercial with a group of consumers, or...

Airplane Terrorism Twenty Years Ago
From Schneier on Security

Airplane Terrorism Twenty Years Ago

Excellent: Here's a scenario: Middle Eastern terrorists hijack a U.S. jetliner bound for Italy. A two-week drama ensues in which the plane's occupants are split...

SAP's in Memory Analytics vs Neteeza?
From The Eponymous Pickle

SAP's in Memory Analytics vs Neteeza?

Some interesting points here about SAP and Netezza.  Set for release in November.

From Computational Complexity

Eleven Tweets from GASARCH

I don't do tweets-I don't think I have enough interesting 140-char notes to tell people (though that doesn't stop Lance). However, several tweet-worthy notes did...

Contributor Agreements Say You
From Wild WebMink

Contributor Agreements Say You

The conversation around LWN’s coverage of Michael Meeks’ talk at the Linux Plumbers Conference (sadly paywalled until now but available today and worth reading...

links for 2010-11-18
From Wild WebMink

links for 2010-11-18

Should Companies That Use Open Source Software Pay a Tithe? They should certainly budget to obtain service and ensure they pay the companies and people that make...

Unsolicited Terrorism Tips to the U.S. Government
From Schneier on Security

Unsolicited Terrorism Tips to the U.S. Government

Adding them all up, the U.S. government "receives between 8,000 and 10,000 pieces of information per day, fingering just as many different people as potential threats...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo