acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Choosing Successful Research
From BLOG@CACM

Choosing Successful Research

How to choose research projects that are more likely to be successful.

Malvertisements Growing as Online Security Threat
From BLOG@CACM

Malvertisements Growing as Online Security Threat

Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...

Successful Software Platforms Are the Byproducts of Successful Businesses
From BLOG@CACM

Successful Software Platforms Are the Byproducts of Successful Businesses

Startups need their current business to be successful and self-sustaining before they place serious effort in building a general software platform.

On Social Networks, Political Campaigns and Threats
From BLOG@CACM

On Social Networks, Political Campaigns and Threats

 Brief discussion on how social networks are now the battlefield of political campaigns, death threats and more.

What Security Advice Should We Give?
From BLOG@CACM

What Security Advice Should We Give?

Are people being rational when they ignore the security advice we give them?  If so, what advice should we give them that they would not ignore?

Personal Factories
From BLOG@CACM

Personal Factories

Since several years ago, with the beginning of nanoscience, the idea having of micro factories, like household microwave ovens, is floating in the air.

Consumerization of IT and Research
From BLOG@CACM

Consumerization of IT and Research

When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...

Turns out That Brain Training Games Don't Work
From BLOG@CACM

Turns out That Brain Training Games Don't Work

A brief article pointing to a new large scale study published in Nature about the effect of brain training games.

Robots After Roomba: The Ethics of Electronic Companions
From BLOG@CACM

Robots After Roomba: The Ethics of Electronic Companions

As robots become woven into the fabric of daily life, what ethical issues will the world face?

What Makes a Good HCI Systems Paper?
From BLOG@CACM

What Makes a Good HCI Systems Paper?

 Proposing a standard for reviewing HCI systems papers.

World of Warcraft-Playing Professors
From BLOG@CACM

World of Warcraft-Playing Professors

Are academics taking serious games too seriously?

Social Media and the Twitter Backchannel at CHI2010
From BLOG@CACM

Social Media and the Twitter Backchannel at CHI2010

A marked difference at CHI 2010 compared to last year is the amount of research around social media and the use of social media during the conference.  These practices...

CHI 2010: ­User Interfaces Learn a Thing or Two
From BLOG@CACM

CHI 2010: ­User Interfaces Learn a Thing or Two

The 2010 conference in Human Factors in Computing Systems has seen a noticeable uptick in projects on and engagement with machine learning.

CHI 2010 Opening Plenary: Thinking About Messy Futures
From BLOG@CACM

CHI 2010 Opening Plenary: Thinking About Messy Futures

"Messy Futures: Culture, Technology and Research" was the title of Genevieve Bell’s opening plenary speech at CHI 2010, and it gave attendees a plethora of facts...

Encouraging Girls to Study Geeky Subjects (part 2): Programmable Bracelets
From BLOG@CACM

Encouraging Girls to Study Geeky Subjects (part 2): Programmable Bracelets

Some thoughts about novel ways to attract girls to study computing: e-textiles and computational crafts.

Internet Information Freedom Revisited.
From BLOG@CACM

Internet Information Freedom Revisited.

Many countries have started to control access to information on Internet for their citizens, most famous case being China, but Latin America does not escape this...

Cleaving Computer Science Into New Degrees
From BLOG@CACM

Cleaving Computer Science Into New Degrees

Computer science is becoming too broad to fit under the tyranny of a single bachelors degree.  Cleaving the BS in CS into new degrees is a natural growth path.

Connecting Computing Education Research to Practice
From BLOG@CACM

Connecting Computing Education Research to Practice

The SIGCSE 2010 keynotes by Sally Fincher and Carl Weiman suggest how we connect research to changing practice.  It's complicated!  It's enculturation. 

Encouraging Girls to Study Geeky Subjects (Part 1): Emotionally Intelligent Tutoring Systems
From BLOG@CACM

Encouraging Girls to Study Geeky Subjects (Part 1): Emotionally Intelligent Tutoring Systems

The first in a couple of articles in which I look at some ways of encouraging girls to engage with technical subjects; this focuses on an emotionally sensitive...

Errors in Database Systems, Eventual Consistency, and the CAP Theorem
From BLOG@CACM

Errors in Database Systems, Eventual Consistency, and the CAP Theorem

Recently, there has been considerable renewed interest in the CAP theorem for database management system (DBMS) applications that span multiple processing sites...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account