acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Designing Effective Interfaces For ­Usable Privacy and Security
From BLOG@CACM

Designing Effective Interfaces For ­Usable Privacy and Security

I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...

E-Commerce in Latin America
From BLOG@CACM

E-Commerce in Latin America

Short talk about the evolution and actual status of e-commerce in Latin America

Nudging Computing Education
From BLOG@CACM

Nudging Computing Education

The nudges of libertarian paternalism have insights for computing education.

The Fallacy of Rankings
From BLOG@CACM

The Fallacy of Rankings

The list of the world's fastest computers will soon be announced. As always, we can expect the latest announcement to garner interest among the technological community...

Latin America & Internet Security
From BLOG@CACM

Latin America & Internet Security

How are our countries dealing with internet security issues? 

Cornell Economist Says Disaster Relief Workers Need AI Tools
From BLOG@CACM

Cornell Economist Says Disaster Relief Workers Need AI Tools

 Economist Christopher B. Barrett has been developing decision trees to help CARE relief workers analyze conditions in disaster zones. They need more efficient...

More on Bridging the Gap Between Ecologists and Computer Scientists
From BLOG@CACM

More on Bridging the Gap Between Ecologists and Computer Scientists

At the First Conference on Computational Sustainability, Cornell's Evan Cooch, evolutionary ecologist, describes what happened in the past when he asked an engineer...

Enviro Scientists Call on Comp Scientists to Bridge Gap in Solving NP-Hard Problems
From BLOG@CACM

Enviro Scientists Call on Comp Scientists to Bridge Gap in Solving NP-Hard Problems

Environmental scientists are unaware of advances in computational complexity and have been limiting problems they tackle, but they are hopeful as result of First...

Matching Digital Photos to Identify Wildlife
From BLOG@CACM

Matching Digital Photos to Identify Wildlife

Dutch Scientists create digital "collective intelligence" system to compare photos of animals' markings. 

Low-Cost Sensors Help People Turn 'Green'
From BLOG@CACM

Low-Cost Sensors Help People Turn 'Green'

University of Washington and Carnegie Mellon researchers are building sensors for phones and homes that give people feedback on their habits and encourage them...

Framing the Right Problem For Water Fowl
From BLOG@CACM

Framing the Right Problem For Water Fowl

 U.S. Geological Survey scientists describe their work, outlining complexity.

HPC: Making a Small Fortune
From BLOG@CACM

HPC: Making a Small Fortune

There is an old joke in the high-performance computing community that begins with a question, “How do you make a small fortune in high-performance computing?” There...

Scientists Convene at First Computational Sustainability Meeting
From BLOG@CACM

Scientists Convene at First Computational Sustainability Meeting

 Keynote Address at the First Computational Sustainability Meeting by Carla Gomes.

Windmills in the Water
From BLOG@CACM

Windmills in the Water

A call to the computer science community for what a research agenda might look like for the role of information and communications technologies in energy, the environment...

E-Government in Latin America
From BLOG@CACM

E-Government in Latin America

According to wikipedia: e-Government  is a diffused neologism used to refer to the use of information and communication technology to provide and improve government...

The Impact of APCS on ­Undergraduate CS Enrollment
From BLOG@CACM

The Impact of APCS on ­Undergraduate CS Enrollment

The critics and detractors of the Advanced Placement exam in Computer Science (APCS) are many.  But the flaws of APCS most likely have no effect on undergraduate...

From BLOG@CACM

In February, President Obama pegged Melissa Hathaway of the National Security Council to do a 60-day review of the nation’s cybersecurity policy. Midway through...

Only the Developed World Lacks Women in Computing
From BLOG@CACM

Only the Developed World Lacks Women in Computing

The developing world has lots of women in computing. Great talks at this week's NCWIT meeting explain why the difference.

Security Education Can Really Work (but Only If It's Done Right)
From BLOG@CACM

Security Education Can Really Work (but Only If It's Done Right)

Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...

'There's an App For That,' and You Could Write It
From BLOG@CACM

'There's an App For That,' and You Could Write It

The challenge of computing education today is convincing students that not every application is done and available for download.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account