acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Tesco's Wireless Item Finder
From The Eponymous Pickle

Tesco's Wireless Item Finder

Storefrontbacktalk reports that Tesco has a system to let shoppers find items in its 3700 plus stores using their IPhones. But they are not providing local WiFi...

The Commercial Speech Arms Race
From Schneier on Security

The Commercial Speech Arms Race

A few years ago, a company began to sell a liquid with identification codes suspended in it. The idea was that you would paint it on your stuff as proof of ownership...

links for 2009-10-16
From Wild WebMink

links for 2009-10-16

ODF plugfest in Orvieto Another fine opportunity to get ODF interoperating as well as possible between different implementations...

From Computational Complexity

Typecasting Again

Lance: Welcome to our second typecast on the last full day of Dagstuhl. I may not see Bill for a while so we'd thought we'd get in one more chat before we go our...

Third Annual Workshop on Search in Social Media (SSM 2010)
From The Noisy Channel

Third Annual Workshop on Search in Social Media (SSM 2010)

I’m proud to announce that Eugene Agichtein, Marti Hearst, and Ian Soboroff have invited me to help organize the upcoming Workshop on Search in Social Media (SSM...

Welcoming Myself to CACM
From My Biased Coin

Welcoming Myself to CACM

I'd like to welcome myself to the Blogroll for the Communications of the ACM! My colleague Greg Morrisett suggested I get my blog into the CACM Blogroll, so asome...

Responding to Social Media : Sidewiki
From The Eponymous Pickle

Responding to Social Media : Sidewiki

Google has recently added a toolbar capability called Sidewiki, which allows anyone to add comments, information or respond to any site. Previous attempts to do...

TDWI: Business Intelligence as a Service
From The Eponymous Pickle

TDWI: Business Intelligence as a Service

I see that TDWI has added a number of new white papers, case studies and other resources on Business Intelligence as a service, have not begun to tap their sources...

Camouflaging a WWII Factory
From Schneier on Security

Camouflaging a WWII Factory

Great pictures.

From Computational Complexity

Thanks for the Fuzzy Memories

In the 1990's Manindra Agrawal and V. Arvind published a paper claiming that if SAT is reducible to a (non-uniform) weighted threshold function then P = NP. Their...

Are Duplicate Tweets Spam?
From The Noisy Channel

Are Duplicate Tweets Spam?


Average Consumer is Gone
From The Eponymous Pickle

Average Consumer is Gone

From Jeff Mills, VP of Client Marketing and Client Management at Thinkvine. If the average consumer does not exist, and is continually evolving, we need solutions...

Linkedin APIs
From The Eponymous Pickle

Linkedin APIs

I still recommend Linkedin first for people that are new to the use of social networking in business. Yet it is not open in the sense of being able to easily get...

The Bizarre Consequences of "Zero Tolerance" Weapons Policies at Schools
From Schneier on Security

The Bizarre Consequences of "Zero Tolerance" Weapons Policies at Schools

Good article: Zachary's offense? [He's six years old.] Taking a camping utensil that can serve as a knife, fork and spoon to school. He was so excited about recently...

links for 2009-10-15
From Wild WebMink

links for 2009-10-15

Firm seeks Glaswegian interpreter I can understand the challenges, but I can usually cope with Glaswegian. Now, Ulster Irish is another matter....

Innovation at Huffington Post: Data-Driven Headlines
From The Noisy Channel

Innovation at Huffington Post: Data-Driven Headlines

The other day, I was suggesting to one of my colleagues that Endeca’s software could help authors write better (translate, more SEO-friendly) headlines. The details...

Data Mining Group
From The Eponymous Pickle

Data Mining Group

The Data Mining Group, based on recent experiences, this is a very good idea: ' ... The Data Mining Group (DMG) is an independent, vendor led consortium thatPredictive...

New Book on Concentration Bounds
From My Biased Coin

New Book on Concentration Bounds

I spent an hour or more today perusing the book Concentration of Measure for the Analysis of Randomized Algorithms, by Devdatt Dubhashi and Alessandro Panconesi...

1777 Steganography
From Schneier on Security

1777 Steganography

Fascinating.

From Computational Complexity

Bill and Lance's Excellent German Adventure

Lance: Because we don't have a good microphone, Bill and I decided to have our first typecast. Hi Bill.   Bill: Hi Lance. We'll be typecast SUPERSTARS.  ...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account