acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Our Big Idea: Open Social Learning
From BLOG@CACM

Our Big Idea: Open Social Learning

Imagine a Facebook where the point is for students to study together, not trade pictures and jokes. Imagine a World of Warcraft where students earn levels and points...

Improving Computer Science Research Collaborations Between U.S. and China
From BLOG@CACM

Improving Computer Science Research Collaborations Between U.S. and China

On March 23-24 2011, the National Science Foundation held a workshop looking at how to build more effective collaborations between computer science researchers...

Obama Administration Announces Landmark Global Internet Strategy
From BLOG@CACM

Obama Administration Announces Landmark Global Internet Strategy

The White House this week announced a comprehensive global strategy document bringing multiple agencies together in an effort to emphasize their commitment to a...

The Impact of Console Games in the Classroom
From BLOG@CACM

The Impact of Console Games in the Classroom

A summary of some interesting findings relating to the use of console games in Scottish primary and secondary school classrooms.

If You Want High School CS, Require ­Undergraduate CS
From BLOG@CACM

If You Want High School CS, Require ­Undergraduate CS

Pushing computer science classes into the high schools is a top-down approach.  If there was required computer science in undergraduate education, the high schools...

Research Directions For Machine Learning and Algorithms
From BLOG@CACM

Research Directions For Machine Learning and Algorithms

An in-depth discussion of near-term research directions for machine learning and algorithms.

Who Needs a Chromebook?
From BLOG@CACM

Who Needs a Chromebook?

Is Google's new Chromebook a fundamental change in personal computing?  Or is it just another netbook?

Information Privacy: Changing Norms and Expectations
From BLOG@CACM

Information Privacy: Changing Norms and Expectations

That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...

When Everything Is Embarrassing: Designing With Teenage Girls
From BLOG@CACM

When Everything Is Embarrassing: Designing With Teenage Girls

A discussion of the difficulties of conducting user-centered design with teenage girls.

Embracing Noise or Why Computer Scientists Should Stop Worrying and Learn to Love the Errors
From BLOG@CACM

Embracing Noise or Why Computer Scientists Should Stop Worrying and Learn to Love the Errors

Precision is not required in everything or even most things.  Failures are best handled by expecting them all the time, not treating them as exceptions.  We should...

Why Have There Been So Many Security Breaches Recently?
From BLOG@CACM

Why Have There Been So Many Security Breaches Recently?

We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...

The Long Road to a Seat at the Table
From BLOG@CACM

The Long Road to a Seat at the Table

Computer science is still a new discipline compared to the rest of STEM. It will take a while for people to know what a "computer scientist" is in the same way...

A Successful NY Celebration of Women in Computing!
From BLOG@CACM

A Successful NY Celebration of Women in Computing!

A recap of our recent New York regional Celebration of Women in Computing.

Stats: We're Doing It Wrong
From BLOG@CACM

Stats: We're Doing It Wrong

A summary of the mistakes researchers make when analysing likert type data and what the correct methods should be.

New York Celebration of Women in Computing
From BLOG@CACM

New York Celebration of Women in Computing

A preview of the upcoming New York Celebration of Women in Computing, which is designed to bring the experience of the Grace Hopper Celebration to students in a...

From 'Must' and 'Unsuitable' to Design Guidelines in Computing Education
From BLOG@CACM

From 'Must' and 'Unsuitable' to Design Guidelines in Computing Education

Rhetoric in education tends to be politicized and polarized, and computing education is no different.  Research in computing education might learn from design-based...

Learning Through Twitter
From BLOG@CACM

Learning Through Twitter

Commentary on a recent study which evalauted the impact of Twitter on student engagement and grades.

Call to Arms: Science and Engineering For Privacy
From BLOG@CACM

Call to Arms: Science and Engineering For Privacy

It is our responsibility as scientists and engineers to understand what can or cannot be done from a technical point of view on privacy.

Explaining Science and Engineering
From BLOG@CACM

Explaining Science and Engineering

As I have followed the international news regarding the Japanese disaster, I have been struck by the challenges each news organization has faced in explaining technical...

Algorithm Visualizations and Community Building
From BLOG@CACM

Algorithm Visualizations and Community Building

If you’re interested in using or developing algorithm visualizations (AVs), you should visit AlgoViz.org, a portal dedicated to creating a repository of AVs and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account