acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

NITRD 20: A Day in Your Life
From BLOG@CACM

NITRD 20: A Day in Your Life

Progress in information technology over the past 20 years has dramatically changed our lives — in our daily routine, at play, and at work. 

Happy 20th Birthday to NITRD!
From BLOG@CACM

Happy 20th Birthday to NITRD!

The theme of NITRD's 20th birthday symposium was to recognize that in just 20 years, computing research has made astounding progress and has had an astounding impact...

A Futuristic Health IT Scenario
From BLOG@CACM

A Futuristic Health IT Scenario

Our technology is the change agent for healthcare in the future.

Connecting Science to Society
From BLOG@CACM

Connecting Science to Society

As America debates how to get through these tough economic times, research funding for science and engineering may get lost in the clamor. Here are some suggestions...

Yes, Computer Scientists Are Hypercritical
From BLOG@CACM

Yes, Computer Scientists Are Hypercritical

Are computer scientists hypercritical? Are we more critical than scientists and engineers in other disciplines? Some numbers from the National Science Foundation...

Call to Arms: Science and Engineering For Privacy
From BLOG@CACM

Call to Arms: Science and Engineering For Privacy

It is our responsibility as scientists and engineers to understand what can or cannot be done from a technical point of view on privacy.

Talking With PCAST
From BLOG@CACM

Talking With PCAST

I told three stories at PCAST — The Google Story, Model Checking, and Machine Learning — as a way to illustrate the importance of sustained federal funding of basic...

Why Peer Review Matters
From BLOG@CACM

Why Peer Review Matters

At the most recent Snowbird conference, there was a plenary session during which the panelists and audience discussed the peer review processes in computing research...

Breaking the Cycle
From BLOG@CACM

Breaking the Cycle

Today's practice of a deadline-driven approach to research is potentially bad for our field. Instead, our focus should be on the quality of the research we do....

Windmills in the Water
From BLOG@CACM

Windmills in the Water

A call to the computer science community for what a research agenda might look like for the role of information and communications technologies in energy, the environment...

From BLOG@CACM

In February, President Obama pegged Melissa Hathaway of the National Security Council to do a 60-day review of the nation’s cybersecurity policy. Midway through...

A Simple View of the Budget Process
From BLOG@CACM

A Simple View of the Budget Process

An abstract view of how NSF gets its money, in the context of the federal budget process.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account