Sign In

Communications of the ACM

Blogroll



An RFID Turntable
From The Eponymous Pickle

An RFID Turntable

The well known design company IDEO, who helped us construct innovation spaces, has designed a turntable (remember those?) style platform that reads a card withExplained...

CIFellows Descend on Washington
From The Computing Community Consortium Blog

CIFellows Descend on Washington

Despite the bad weather affecting travel across much of the nation,

Ant Algorithms
From The Eponymous Pickle

Ant Algorithms

New work on the use of biologically inspired methods.  Here the problem is finding shortest paths in busy networks.  The inspiration is how ants can find theirReport...

HP Gives up on BI
From The Eponymous Pickle

HP Gives up on BI

In an intriguing development HP has backed off of their business intelligence and analytics efforts.  I have visited HP labs a number of times and was always impressed...

? White Waves
From Wild WebMink

? White Waves

The new Mixed Tape compilation is available – 10 free tracks awaiting download. Most of them got 3 stars in the Webmink Rating System but your taste may vary, and...

Social Media Resources
From The Eponymous Pickle

Social Media Resources

A good list of social media resources from Mashable.  Good for those that want to expand their understanding of social methods.

Signals Online
From The Eponymous Pickle

Signals Online

Intriguing essay in Batelle's Searchblog: Signal, Curation, Discovery.  On a number of themes in the search industry, the current players and directions being explored...

Generated QR codes from Google
From The Eponymous Pickle

Generated QR codes from Google

Its pretty old news that Google has it's own URL shortener.  called goo.gl    It is perhaps also old news that you can also use this shortener to create a 2-D QR...

First Week
From The Noisy Channel

First Week

It’s hardly surprising, at least in retrospect, that location-based social networking company Foursquare was founded (twice!) in New York City. Where else (at least...

? Cloud Correction
From Wild WebMink

? Cloud Correction

@webminkSimon Phipps Try adding "as long as you don't breach the terms of service – according to our sole judgement" to the end of any cloud computing pitch. about...

links for 2010-12-11
From Wild WebMink

links for 2010-12-11

WikiLeaks: Stop the crackdown As I said in the "Voltaire Moment" article I posted here yesterday, the attacks on our collective freedom resulting from Wikileaks...

Carbonara: the Possibilities Behind Exotic Carbon Structures
From The Eponymous Pickle

Carbonara: the Possibilities Behind Exotic Carbon Structures

I got late to this article in the Futurist, which extols the continuing possibilities, boosted by discoveries in nanotechnology, and the annoying delays in their...

Decision Analysis Software Survey
From The Eponymous Pickle

Decision Analysis Software Survey

A little late, but OR/MS does an excellent survey of decision analysis software every year.  If you are interested in the topic, take a look here.  " ... Dennis...

? Voltaire Moment Article Available
From Wild WebMink

? Voltaire Moment Article Available

My article asserting that we need to stand up for Wikileaks’ ability to exist even if we don’t like Wikileaks is now available in the Essays area.

Friday Squid Blogging: Glowing Squid
From Schneier on Security

Friday Squid Blogging: Glowing Squid

Recent research. And an older video.

New TSA Security Test
From Schneier on Security

New TSA Security Test

I experienced a new TSA security check at Phoenix Airport last Thursday. The agent took my over-three-ounce bottle of saline, put a drop of it on a white cardboard...

10th Anniversary Edition of
From Michael Nielsen

10th Anniversary Edition of

I’m pleased to say that a 10th anniversary edition of my book with Ike Chuang on quantum computing has just been released by Cambridge University Press (Amazon...

NIST Announces SHA-3 Finalists (Skein is One of Them)
From Schneier on Security

NIST Announces SHA-3 Finalists (Skein is One of Them)

Yesterday, NIST announced the five hash functions to advance to the third (and final) round in the SHA-3 selection process: BLAKE, Grøstl, JH, Keccak, and Skein...

Don
From The Computing Community Consortium Blog

Don

There’s been lots of coverage elsewhere, but just a reminder that it’s

The Open Library
From The Eponymous Pickle

The Open Library

There are millions of books free for the e-reading out there.  Most pay reading services include them as well for free.  Now the Open Library has introduced a new...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo