Sign In

Communications of the ACM

Blogroll



Beyond the experience: In search of an operative paradigm for the industrialisation of services
From Putting People First

Beyond the experience: In search of an operative paradigm for the industrialisation of services

Nicola Morelli (blog), an associate professor at the School of Architecture and Design at Aalborg University in Denmark, reflects on the two inspirations for a...

Leaked 9/11 Text Messages
From Schneier on Security

Leaked 9/11 Text Messages

Wikileaks has published pager intercepts from New York on 9/11: WikiLeaks released half a million US national text pager intercepts. The intercepts cover a 24nuggets...

The other side of the table: Limsoon Wong
From Return 42;

The other side of the table: Limsoon Wong

Professor and Head of Computer Science of the School of Computing at the National University of Singapore. Before that, he was the Deputy Executive Director for...

links for 2009-11-26
From Wild WebMink

links for 2009-11-26

Closures for Java "Revising a programming language that

"Verified by VISA": Still Using SSNs Online, Dropped by PEFCU
From CERIAS Blog

"Verified by VISA": Still Using SSNs Online, Dropped by PEFCU

I have written before about the "Verified by VISA" program. While shopping for Thanksgiving online this year, I noticed that Verified by Visa scripts were blocked...

Marti Hearst: Tech Talk on Search User Interfaces
From The Noisy Channel

Marti Hearst: Tech Talk on Search User Interfaces


Happy Holidays
From Computer Science Teachers Association

Happy Holidays

The end of the year brings upon us the celebrations that come with the holidays. This year, we have extra reason to celebrate with an added holiday. The week of...

PASS ID Moves Forward in Congress
From U.S. Public Policy Committee of the ACM

PASS ID Moves Forward in Congress

PASS ID, S. 1261, is a bill introduced in June as an attempt to break through the impasse over REAL ID. That law, passed as part of a budget bill in 2005, was...

Acquisitions as Retail Geography
From The Eponymous Pickle

Acquisitions as Retail Geography

A BNet article that looks at P&G past acquisitions, and speculates about future M&A in terms of retail space coverage. I like the idea of understanding products...

Mumbai Terrorist Attacks
From Schneier on Security

Mumbai Terrorist Attacks

Long, detailed, and very good story of the Mumbai terrorist attacks of last year. My own short commentary in the aftermath of the attacks.

IBM Crowdsourcing
From The Eponymous Pickle

IBM Crowdsourcing

An instructive piece on how IBM sources skills to a job. Requires registration. -

Learning with Serious Games
From The Eponymous Pickle

Learning with Serious Games

On learning through games and simulations. ' ... Karl Kapp, professor, author and speaker, understands the value of games and simulations in learning. In this...

Drawing as Thinking
From The Eponymous Pickle

Drawing as Thinking

David Sibbet passes along a link to a video by Milton Glaser on drawing as another form of thinking.

From Computational Complexity

Birthday Paradox Variance

First a message from David Johnson for proposals on locations for SODA 2012 both in and outside the US. Here's an interesting approach to the birthday paradox...

Embracing an Innovation
From The Eponymous Pickle

Embracing an Innovation

A timely piece in [email protected] on choosing innovations. Something we and all enterprises struggled with under the topic of knowledge management and portfolio...

Virtual Mafia in Online Worlds
From Schneier on Security

Virtual Mafia in Online Worlds

If you allow players in an online world to penalize each other, you open the door to extortion: One of the features that supported user socialization in the game...

links for 2009-11-25
From Wild WebMink

links for 2009-11-25

Senators press EU to speed its Oracle-Sun probe US senators, that is. I'm sure the Commission will completely ignore them. (tags: Sun Oracle...

fMRI used in Sentencing
From The Eponymous Pickle

fMRI used in Sentencing

Having just personally experienced my first fMRI, this caught my eye. Apparently the first time that this has been done in a courtroom. Not that the method is being...

Real Code is Messy
From Computer Science Teachers Association

Real Code is Messy

Reading John Harrison's blog of November 3 got me thinking about what I am trying to teach my students in my third-semester (university) course about the development...

Users Rationally Rejecting Security Advice
From Schneier on Security

Users Rationally Rejecting Security Advice

This paper, by Cormac Herley at Microsoft Research, sounds like me: Abstract: It is often suggested that users are hopelessly lazy and unmotivated on securityme...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account