acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Essentials of BI Dashboards
From BLOG@CACM

Essentials of BI Dashboards

A well-designed dashboard is everyone's dream come true.

Anti-Racist Computing Education: No More Excuses
From BLOG@CACM

Anti-Racist Computing Education: No More Excuses

On this #MLKDay, a list of resources to help center racial equity and justice in CS classrooms and a reminder that the CS Education community must make good on...

Software Stories: Legal Trouble
From BLOG@CACM

Software Stories: Legal Trouble

Legal troubles represent another collection of potential pitfalls where developers often find themselves unprepared. 

Changes in the Technion's Teaching Strategies During the Pandemic
From BLOG@CACM

Changes in the Technion's Teaching Strategies During the Pandemic

This post describes three significant changes that took place during the pandemic in the instructional strategies at the Technion – Israel Institute of Technology...

Cultivating Habits: -1 +2 for Researchers
From BLOG@CACM

Cultivating Habits: -1 +2 for Researchers

The New Year is stereotypically the time when we resolve to start some good habits and get rid of some of the bad.

Finding a Path to CS for All: How Many U.S. High School Students Have Taken CS?
From BLOG@CACM

Finding a Path to CS for All: How Many U.S. High School Students Have Taken CS?

How do we measure progress towards CS for All?

Framing the Description of the Shrinking Pipeline
From BLOG@CACM

Framing the Description of the Shrinking Pipeline

The shrinking pipeline refers to the low percentages of women earning computer science academic degrees and holding faculty positions.

Original Roman Pocket Calculators are Extremely Rare
From BLOG@CACM

Original Roman Pocket Calculators are Extremely Rare

As far as we know, only three or four original specimens of the Roman hand abacus have survived.

Experiencing Loops in Time
From BLOG@CACM

Experiencing Loops in Time

We don't experience program loops as blocks, started over, because time is one-way.

Computational Thinking: The Discussion Continues
From BLOG@CACM

Computational Thinking: The Discussion Continues

Perspectives on computational thinking.

AI Education for Teens: Lifting the Hood on Data and Machine Learning
From BLOG@CACM

AI Education for Teens: Lifting the Hood on Data and Machine Learning

What are key ideas and intuitions foundational to AI that AI education in secondary schools should target? This blog post describes our approach to teaching AI...

Publishing, The Choice and The Luck
From BLOG@CACM

Publishing, The Choice and The Luck

Selecting publishing targets is a process with no simple solutions.

Major Investments in U.S. CS Education on the Long Road to CS for All
From BLOG@CACM

Major Investments in U.S. CS Education on the Long Road to CS for All

The 2021 CSEdCon featured big investments in growing Computer Science Education in the U.S.

How to Reduce the Carbon Emissions of Your Website
From BLOG@CACM

How to Reduce the Carbon Emissions of Your Website

We can control our online ecological impact.

Safe AI in Education Needs You
From BLOG@CACM

Safe AI in Education Needs You

Artificial intelligence is coming to your learners and will raise challenging issues that need experts like you. Learn how you can get involved in AI and Educational...

What Should be Done About Facebook?
From BLOG@CACM

What Should be Done About Facebook?

The recent release of the Facebook papers by a whistleblower has confirmed that leaders at the company have long known about problems facilitated by their social...

Hybrid Models for Legacy Modernization in Digital Transformation Programs
From BLOG@CACM

Hybrid Models for Legacy Modernization in Digital Transformation Programs

There is now a greater need to move away from legacy technologies than ever before.

Patent Protection in Europe
From BLOG@CACM

Patent Protection in Europe

Up to the second half of the 19th century —with the exception of the industrial power Great Britain—the protection of inventions was inadequate and strongly disputed...

Reinforcing Computer Science Education
From BLOG@CACM

Reinforcing Computer Science Education

What do computer science students need to know to be successful in industry?

Is It Difficult to Bypass the Protection That Uses Big Data?
From BLOG@CACM

Is It Difficult to Bypass the Protection That Uses Big Data?

Big data analytics systems identify signs of unauthorized activity in vast arrays of structured and unstructured data.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account