acm-header
Sign In

Communications of the ACM

BLOG@CACM


Refine your search:
dateMore Than a Year Ago
subjectComputers And Society
authorJeannette M. Wing
bg-corner

NITRD 20: A Day in Your Life
From BLOG@CACM

NITRD 20: A Day in Your Life

Progress in information technology over the past 20 years has dramatically changed our lives — in our daily routine, at play, and at work. 

Happy 20th Birthday to NITRD!
From BLOG@CACM

Happy 20th Birthday to NITRD!

The theme of NITRD's 20th birthday symposium was to recognize that in just 20 years, computing research has made astounding progress and has had an astounding impact...

A Futuristic Health IT Scenario
From BLOG@CACM

A Futuristic Health IT Scenario

Our technology is the change agent for healthcare in the future.

Connecting Science to Society
From BLOG@CACM

Connecting Science to Society

As America debates how to get through these tough economic times, research funding for science and engineering may get lost in the clamor. Here are some suggestions...

Yes, Computer Scientists Are Hypercritical
From BLOG@CACM

Yes, Computer Scientists Are Hypercritical

Are computer scientists hypercritical? Are we more critical than scientists and engineers in other disciplines? Some numbers from the National Science Foundation...

Talking With PCAST
From BLOG@CACM

Talking With PCAST

I told three stories at PCAST — The Google Story, Model Checking, and Machine Learning — as a way to illustrate the importance of sustained federal funding of basic...

Why Peer Review Matters
From BLOG@CACM

Why Peer Review Matters

At the most recent Snowbird conference, there was a plenary session during which the panelists and audience discussed the peer review processes in computing research...

Windmills in the Water
From BLOG@CACM

Windmills in the Water

A call to the computer science community for what a research agenda might look like for the role of information and communications technologies in energy, the environment...

From BLOG@CACM

In February, President Obama pegged Melissa Hathaway of the National Security Council to do a 60-day review of the nation’s cybersecurity policy. Midway through...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account