On this #MLKDay, a list of resources to help center racial equity and justice in CS classrooms and a reminder that the CS Education community must make good on...Shuchi Grover From BLOG@CACM | January 17, 2022 at 08:02 PM
Legal troubles represent another collection of potential pitfalls where developers often find themselves unprepared.
Doug Meil From BLOG@CACM | January 3, 2022 at 12:56 PM
This post describes three significant changes that took place during the pandemic in the instructional strategies at the Technion – Israel Institute of Technology...Orit Hazzan, Efrat Aviram, Yael Erez, and Waseem Makhoul From BLOG@CACM | January 3, 2022 at 11:39 AM
The New Year is stereotypically the time when we resolve to start some good habits and get rid of some of the bad.
Saurabh Bagchi From BLOG@CACM | January 3, 2022 at 11:16 AM
The shrinking pipeline refers to the low percentages of women earning computer science academic degrees and holding faculty positions.
Orit Hazzan and Heftzi Zohar From BLOG@CACM | December 15, 2021 at 10:03 AM
As far as we know, only three or four original specimens of the Roman hand abacus have survived.
Herbert Bruderer From BLOG@CACM | December 1, 2021 at 09:05 AM
What are key ideas and intuitions foundational to AI that AI education in secondary schools should target? This blog post describes our approach to teaching AI...Shuchi Grover and Brian Broll From BLOG@CACM | November 23, 2021 at 04:16 PM
The 2021 CSEdCon featured big investments in growing Computer Science Education in the U.S.
Mark Guzdial From BLOG@CACM | November 22, 2021 at 11:52 AM
Artificial intelligence is coming to your learners and will raise challenging issues that need experts like you. Learn how you can get involved in AI and Educational...Leah Friedman, Nancye Blair Black, Erin Walker, and Jeremy Roschelle From BLOG@CACM | November 8, 2021 at 09:51 AM
The recent release of the Facebook papers by a whistleblower has confirmed that leaders at the company have long known about problems facilitated by their social...Jason Hong From BLOG@CACM | November 12, 2021 at 12:35 PM
Up to the second half of the 19th century —with the exception of the industrial power Great Britain—the protection of inventions was inadequate and strongly disputed...Herbert Bruderer From BLOG@CACM | November 8, 2021 at 09:54 AM
Big data analytics systems identify signs of unauthorized activity in vast arrays of structured and unstructured data.
Alex Vakulov From BLOG@CACM | October 28, 2021 at 09:44 AM