acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

SIGIR 2017 Day 1: Neural Networks For IR
From BLOG@CACM

SIGIR 2017 Day 1: Neural Networks For IR

Blog on a one-day tutorial on Neural Networks at SIGIR 2017.

CSTA: Computer Science Education, Equity, and the Future Workforce
From BLOG@CACM

CSTA: Computer Science Education, Equity, and the Future Workforce

The Big IDEA and the PD Pipeline are two examples of industry-changing initiatives launched by the Computer Science Teachers Association over the past two years...

On the Ethics of Cyberwar
From BLOG@CACM

On the Ethics of Cyberwar

Keith Abney of the Ethics + Emerging Sciences group of California Polytechnic State University surveys the moral landscape of cyberwar.

Coding in Schools as New Vocationalism: Larry Cuban on What Schools Are For
From BLOG@CACM

Coding in Schools as New Vocationalism: Larry Cuban on What Schools Are For

 What are schools for, and is coding a necessary part of that?

Deep Dictionary
From BLOG@CACM

Deep Dictionary

The abstraction from big data on English words of distributed vector representations computing simple semantic aspects has drawn interest from the computing community...

CS Education on Tablets For CS for All (#Tablets4CS For #CSforAll)
From BLOG@CACM

CS Education on Tablets For CS for All (#Tablets4CS For #CSforAll)

If we design CS education for tablets, everyone will learn better.

Toward Oversight, and More Debate, of Cyber Weaponry
From BLOG@CACM

Toward Oversight, and More Debate, of Cyber Weaponry

Policies and strategies that may lead to or initiate acts of cyberwar should be subject to scrutiny. 

Ten Years at the Helm of <i>Communications of the ACM</i>
From BLOG@CACM

Ten Years at the Helm of Communications of the ACM

In January 2007, I undertook the task of revitalizing Communications of the ACM. Now, after 10 years at the helm of Communications, it is time for me to move on...

Will Machine Learning Prevent ­S From Achieving the Goals of Teaching Computing to Everyone?
From BLOG@CACM

Will Machine Learning Prevent ­S From Achieving the Goals of Teaching Computing to Everyone?

At TURC, ACM leaders consider the future of AI, and I ask about the implications for computing education

Operating Systems as Possible Worlds
From BLOG@CACM

Operating Systems as Possible Worlds

Is a comparison between operating systems, which are analyzed by software engineers for conditional execution paths, and possible worlds, which are analyzed by...

Fact Over Fiction
From BLOG@CACM

Fact Over Fiction

Given a choice between the right to mass-disinform and democracy, I choose democracy.

Evaluating Computer Science ­Undergraduate Teaching: Why Student Evaluations Are Likely Biased
From BLOG@CACM

Evaluating Computer Science ­Undergraduate Teaching: Why Student Evaluations Are Likely Biased

Unconscious bias is pervasive in computing, and training is our best remedy, how can untrained students evaluate their CS teachers without bias?

Generation CS: When ­Undergraduates Realized They Needed Computing
From BLOG@CACM

Generation CS: When ­Undergraduates Realized They Needed Computing

 A new Computing Research Association report describes the dramatic influx of undergraduates into computer science classes.

Cybersecurity in the Trump Era
From BLOG@CACM

Cybersecurity in the Trump Era

Deterrence is simply the wrong way to think about cybersecurity.

Just Press Reboot
From BLOG@CACM

Just Press Reboot

Why does the press continue to talk about "computer problems"?

Fact Versus Frivolity in Facebook
From BLOG@CACM

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.

ACM's Open-Conference Principle and Political Reality
From BLOG@CACM

ACM's Open-Conference Principle and Political Reality

The Open-Conference Principle is aimed at benefiting society.

Fiction as Model Theory
From BLOG@CACM

Fiction as Model Theory

Like model theory, fiction deploys a theory and an interpretation.  An interpretation that makes the statements of the theory true demonstrates consistency, in...

The Real Lesson of the Alleged Russian Hack
From BLOG@CACM

The Real Lesson of the Alleged Russian Hack

Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...

What Happened?
From BLOG@CACM

What Happened?

As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account