acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

The Nastiness Problem in Computer Science
From BLOG@CACM

The Nastiness Problem in Computer Science

Are we malevolent grumps? Nothing personal, but as a community computer scientists sometimes seem to succumb to negativism.

Game-Based Ideas Management in the Workplace
From BLOG@CACM

Game-Based Ideas Management in the Workplace

A brief discussion of ideas management software used by the U.K. government.

What We Owe Google, and What Google Owes ­Us
From BLOG@CACM

What We Owe Google, and What Google Owes ­Us

We rely on online information sources—maybe too much. What is our responsibility to make sure that they're accurate, and what responsibility do the sources have...

Being Bilingual: Speaking Technology and Policy
From BLOG@CACM

Being Bilingual: Speaking Technology and Policy

How do we cross the intellectual divide, providing technical advice to policy experts in ways that they find useful and actionable? Equally importantly, how do...

Improving Computer Science Research Collaborations Between U.S. and China
From BLOG@CACM

Improving Computer Science Research Collaborations Between U.S. and China

On March 23-24 2011, the National Science Foundation held a workshop looking at how to build more effective collaborations between computer science researchers...

Obama Administration Announces Landmark Global Internet Strategy
From BLOG@CACM

Obama Administration Announces Landmark Global Internet Strategy

The White House this week announced a comprehensive global strategy document bringing multiple agencies together in an effort to emphasize their commitment to a...

The Impact of Console Games in the Classroom
From BLOG@CACM

The Impact of Console Games in the Classroom

A summary of some interesting findings relating to the use of console games in Scottish primary and secondary school classrooms.

Information Privacy: Changing Norms and Expectations
From BLOG@CACM

Information Privacy: Changing Norms and Expectations

That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...

Why Have There Been So Many Security Breaches Recently?
From BLOG@CACM

Why Have There Been So Many Security Breaches Recently?

We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...

The Long Road to a Seat at the Table
From BLOG@CACM

The Long Road to a Seat at the Table

Computer science is still a new discipline compared to the rest of STEM. It will take a while for people to know what a "computer scientist" is in the same way...

A Successful NY Celebration of Women in Computing!
From BLOG@CACM

A Successful NY Celebration of Women in Computing!

A recap of our recent New York regional Celebration of Women in Computing.

Learning Through Twitter
From BLOG@CACM

Learning Through Twitter

Commentary on a recent study which evalauted the impact of Twitter on student engagement and grades.

Explaining Science and Engineering
From BLOG@CACM

Explaining Science and Engineering

As I have followed the international news regarding the Japanese disaster, I have been struck by the challenges each news organization has faced in explaining technical...

Who Needs a Tablet?
From BLOG@CACM

Who Needs a Tablet?

Tablets do not solve a mainstream problem, they only serve a niche.

At the NSF CE21 Meeting: We Have Such a Long Way to Go
From BLOG@CACM

At the NSF CE21 Meeting: We Have Such a Long Way to Go

The NSF CE21 Community Meeting highlighted the opportunity that computing has to catch up with the rest of STEM on education issues.

Let's Teach Malware When It's Ready: The Purpose of ­Undergrad CS
From BLOG@CACM

Let's Teach Malware When It's Ready: The Purpose of ­Undergrad CS

Ledin's call for teaching malware to all undergraduate students conflicts with my understanding of the purpose of an undergraduate CS degree. 

Intellectual Amplification via Computing
From BLOG@CACM

Intellectual Amplification via Computing

As the recent performance of IBM's Watson system on the game show Jeopardy! illustrated, the combination of large-scale data, rich algorithm suites and powerful...

Who Needs a Netbook?
From BLOG@CACM

Who Needs a Netbook?

In only a couple years, improved smartphones and laptops have closed the niche that netbooks lived in. Rather than mourn the loss of netbooks, let's celebrate their...

How to Make a Geek Goddess Spit with Rage
From BLOG@CACM

How to Make a Geek Goddess Spit with Rage

 A rather grumpy review of the book How to Be a Geek Goddess.

Teaching Kids to Feel the Math With Computers
From BLOG@CACM

Teaching Kids to Feel the Math With Computers

Why are students still calculating when they could be understanding?  Now that computers are everywhere, how should math education change?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account