acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Where Does this Blog Come From?
From The Eponymous Pickle

Where Does this Blog Come From?

This blog was originally established to communicate to visitors at Procter & Gamble's Innovation Centers. I was asked during many visits that major retailers and...

Video Ubiquity
From The Eponymous Pickle

Video Ubiquity

I had thought that video had become as prevasive as it could be. Good GigaOm article on how falling prices are driving it much further. Will introduce new challenges...

Report on Spam Content of the Web
From The Eponymous Pickle

Report on Spam Content of the Web

An analysis of some recent Websense stats point to the finding that " ... 95% of User Generated Content is either malicious in nature or spam ... " . Not sureFull...

Bliink Web Design Competition for Texas High School Students
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Bliink Web Design Competition for Texas High School Students

The Microsoft Corporation, NASA, the Texas Business & Education Coalition, and the State of Texas would like to invite you and your students to participate in the...

Better Ways to Manage Knowledge
From The Eponymous Pickle

Better Ways to Manage Knowledge

Good piece on the subject, they relate some of the same problems we saw in the enterprise regarding institutionalizing knowledge ... and implementing a solution...

K-12 Events at SIGCSE
From Computer Science Teachers Association

K-12 Events at SIGCSE

I'd like to let everyone know that the early registration deadline for SIGCSE 2010 is coming up at the end of January. While SIGCSE runs from March 11-13, there...

Live at Interaction
From Putting People First

Live at Interaction

Niklas Wolkert & Brad Nunnally provide their second report on Johnnyy Holland on the Interaction10 conference in Savannah, Georgia – this time focused on the second...

Beginning to Rethink CS Education at NSF
From U.S. Public Policy Committee of the ACM

Beginning to Rethink CS Education at NSF

The President released his $3.8 trillion budget on Monday setting off a flurry of activity in the Nation's Capital. The budget sets the Administration's priorities...

New Attack on Threefish
From Schneier on Security

New Attack on Threefish

At FSE 2010 this week, Dmitry Khovratovich and Ivica Nikolic presented a paper where they cryptanalyze ARX algorithms (algorithms that use only addition, rotation...

links for 2010-02-07
From Wild WebMink

links for 2010-02-07

Tinkerer

Vacation
From The Noisy Channel

Vacation

Just letting readers know that I’ll be on vacation for the next week. If you are starved for reading materials, check out some of the blogs I read.

Nominations Sought for Extraordinary Student Stories Award
From The Computing Community Consortium Blog

Nominations Sought for Extraordinary Student Stories Award

The Ewing Marion Kauffman Foundation is sponsoring an award for K-12, undergraduate,

WSDM 2010: Day 3
From The Noisy Channel

WSDM 2010: Day 3

Note: this post is cross-posted at BLOG@CACM. Today is the last day of

Hyperlocal Coupons
From The Eponymous Pickle

Hyperlocal Coupons

Hyperlocal mobile coupons for the IPhone: Mobiqpons. Tested, well done, it should further locate you when you redeem them for loyalty measures.

On Associative Memory
From The Eponymous Pickle

On Associative Memory

Good overview on associative memories. We tested these during our AI days and talked to a number of vendors. The hope was that they could include some of the'case...

Paid vs Free Content
From The Eponymous Pickle

Paid vs Free Content

An interview with Professors Peter Fader and Stepen Kobrin of Wharton on these and other recent topics in Knowledge@Wharton

Live at Interaction
From Putting People First

Live at Interaction

Niklas Wolkert & Brad Nunnally report on Johnnyy Holland on the first day of the Interaction10 conference in Savannah, Georgia. “If one thing had to describe the...

WSDM 2010: Day 2
From The Noisy Channel

WSDM 2010: Day 2

Note: this post is cross-posted at BLOG@CACM. Unfortunately, I woke up this morning rather under the weather, so I’m having to resort to remotely reporting on the...

Guest Post:  Giorgos Zervas from WSDM, Part 2
From My Biased Coin

Guest Post: Giorgos Zervas from WSDM, Part 2

Day two of WSDM was highlighted by two great presentations which I enjoyed for different reasons. I think the strong features of both could be incorporated in almost...

Friday Squid Blogging: Squid Cookie
From Schneier on Security

Friday Squid Blogging: Squid Cookie

I wonder if it's tasty.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account