acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Are Data Miners Ready to Hang ­p the Hard Hat and Put on a Lab Coat?
From BLOG@CACM

Are Data Miners Ready to Hang ­p the Hard Hat and Put on a Lab Coat?

We will find out this week at the annual ACM SIGKDD on Knowledge Discovery and Data Mining conference in Chicago.

Why HCI Should Listen to Mothers
From BLOG@CACM

Why HCI Should Listen to Mothers

A call for the HCI community to spend some design effort on helping new mothers with the considerable physical and emotional challenges they face.

Towards Empirical Answers to the Core Problems of Software Engineering
From BLOG@CACM

Towards Empirical Answers to the Core Problems of Software Engineering

Can empirical research give us an answer to the big problems?

Leaping the Exascale Chasm
From BLOG@CACM

Leaping the Exascale Chasm

The global race is on to build ever-faster supercomputers, fueled by a combination of scientific and engineering needs to simulate phenomena with greater resolution...

Why Scientists and Engineers Must Learn Programming
From BLOG@CACM

Why Scientists and Engineers Must Learn Programming

Scientists and engineers who program can work 10 to 100 times faster and come up with more creative solutions than those who don't.

What's Our Goal For a CS Degree, and How Do We Know We Got There?
From BLOG@CACM

What's Our Goal For a CS Degree, and How Do We Know We Got There?

A history of computing suggests that the computer science undergraduate degree is unnecessarily rigorous and may not be achieving the goals we have for it.

Reaching For Engelbart's Vision of the Future
From BLOG@CACM

Reaching For Engelbart's Vision of the Future

 A meditation on Douglas Engelbart's impact on interactive computing.

ACM-W: One Way to Support Women in Computing!
From BLOG@CACM

ACM-W: One Way to Support Women in Computing!

An update on ACM-W activities in 2012-2013, and a look to the coming year.

So, Who Won The Battle Of The Brains?
From BLOG@CACM

So, Who Won The Battle Of The Brains?

And the winner of the ACM International Collegiate Programming Contest is...

The ACM ICPC Competition Continues...
From BLOG@CACM

The ACM ICPC Competition Continues...

ITMO is the host of this year's ACM ICPC.

The Heat Is On
From BLOG@CACM

The Heat Is On

Students work together to solve complicated problems while competing at the ACM International Collegiate Programming Contest.

Here We Go!
From BLOG@CACM

Here We Go!

The ACM ICPC kicks off!

The Lull Before the Storm
From BLOG@CACM

The Lull Before the Storm

The evening before the ACM International Collegiate Programming Contest (ICPC) World Finals.

The World's Smartest Programmers Compete: ACM ICPC
From BLOG@CACM

The World's Smartest Programmers Compete: ACM ICPC

An introductory post with background on the ACM International Collegiate Programming Contest.

Education Removes Fear: Some Examples From CS Courses
From BLOG@CACM

Education Removes Fear: Some Examples From CS Courses

One purpose of education is to remove fear; I present some examples from CS courses.

Closing the Computing Labor Shortage with Computing in Schools
From BLOG@CACM

Closing the Computing Labor Shortage with Computing in Schools

 Getting more and better computing education into high schools is likely to have a big impact on computing careers.

CFP: Whither the NSA Warrantless Internet Surveillance Program
From BLOG@CACM

CFP: Whither the NSA Warrantless Internet Surveillance Program

Leading protagonists in the NSA’s warrantless internet surveillance debate discuss the program’s current status in light of recent revelations, focusing on the...

CFP: Homegrown Drones: Should the FAA Take on Regulating Hobbyists?
From BLOG@CACM

CFP: Homegrown Drones: Should the FAA Take on Regulating Hobbyists?

Panel discusses whether drone use by individuals should be regulated by the FAA.

CFP: Tor: Online Privacy and Anonymity
From BLOG@CACM

CFP: Tor: Online Privacy and Anonymity


CFP: FTC Commissioner Julie Brill
From BLOG@CACM

CFP: FTC Commissioner Julie Brill

Commissioner Brill addresses four major challenges to Big Data and the Reclaim Your Name Initiative 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account