acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Research Directions For Machine Learning and Algorithms
From BLOG@CACM

Research Directions For Machine Learning and Algorithms

An in-depth discussion of near-term research directions for machine learning and algorithms.

Who Needs a Chromebook?
From BLOG@CACM

Who Needs a Chromebook?

Is Google's new Chromebook a fundamental change in personal computing?  Or is it just another netbook?

Information Privacy: Changing Norms and Expectations
From BLOG@CACM

Information Privacy: Changing Norms and Expectations

That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...

When Everything Is Embarrassing: Designing With Teenage Girls
From BLOG@CACM

When Everything Is Embarrassing: Designing With Teenage Girls

A discussion of the difficulties of conducting user-centered design with teenage girls.

Embracing Noise or Why Computer Scientists Should Stop Worrying and Learn to Love the Errors
From BLOG@CACM

Embracing Noise or Why Computer Scientists Should Stop Worrying and Learn to Love the Errors

Precision is not required in everything or even most things.  Failures are best handled by expecting them all the time, not treating them as exceptions.  We should...

Why Have There Been So Many Security Breaches Recently?
From BLOG@CACM

Why Have There Been So Many Security Breaches Recently?

We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...

The Long Road to a Seat at the Table
From BLOG@CACM

The Long Road to a Seat at the Table

Computer science is still a new discipline compared to the rest of STEM. It will take a while for people to know what a "computer scientist" is in the same way...

A Successful NY Celebration of Women in Computing!
From BLOG@CACM

A Successful NY Celebration of Women in Computing!

A recap of our recent New York regional Celebration of Women in Computing.

Stats: We're Doing It Wrong
From BLOG@CACM

Stats: We're Doing It Wrong

A summary of the mistakes researchers make when analysing likert type data and what the correct methods should be.

New York Celebration of Women in Computing
From BLOG@CACM

New York Celebration of Women in Computing

A preview of the upcoming New York Celebration of Women in Computing, which is designed to bring the experience of the Grace Hopper Celebration to students in a...

From 'Must' and 'Unsuitable' to Design Guidelines in Computing Education
From BLOG@CACM

From 'Must' and 'Unsuitable' to Design Guidelines in Computing Education

Rhetoric in education tends to be politicized and polarized, and computing education is no different.  Research in computing education might learn from design-based...

Learning Through Twitter
From BLOG@CACM

Learning Through Twitter

Commentary on a recent study which evalauted the impact of Twitter on student engagement and grades.

Call to Arms: Science and Engineering For Privacy
From BLOG@CACM

Call to Arms: Science and Engineering For Privacy

It is our responsibility as scientists and engineers to understand what can or cannot be done from a technical point of view on privacy.

Explaining Science and Engineering
From BLOG@CACM

Explaining Science and Engineering

As I have followed the international news regarding the Japanese disaster, I have been struck by the challenges each news organization has faced in explaining technical...

Algorithm Visualizations and Community Building
From BLOG@CACM

Algorithm Visualizations and Community Building

If you’re interested in using or developing algorithm visualizations (AVs), you should visit AlgoViz.org, a portal dedicated to creating a repository of AVs and...

TeachScheme! U­sing Mathematics to Teach Programming
From BLOG@CACM

TeachScheme! U­sing Mathematics to Teach Programming

Matthias Felleisen and a team of computer scientists have developed the TeachScheme! Project, which provides high school teachers with courseware and other tools...

Who Needs a Tablet?
From BLOG@CACM

Who Needs a Tablet?

Tablets do not solve a mainstream problem, they only serve a niche.

Software Verification Turns Mainstream
From BLOG@CACM

Software Verification Turns Mainstream

Verification is maturing to the point where it will become integrated into mainstream software development.

At the NSF CE21 Meeting: We Have Such a Long Way to Go
From BLOG@CACM

At the NSF CE21 Meeting: We Have Such a Long Way to Go

The NSF CE21 Community Meeting highlighted the opportunity that computing has to catch up with the rest of STEM on education issues.

Let's Teach Malware When It's Ready: The Purpose of ­Undergrad CS
From BLOG@CACM

Let's Teach Malware When It's Ready: The Purpose of ­Undergrad CS

Ledin's call for teaching malware to all undergraduate students conflicts with my understanding of the purpose of an undergraduate CS degree. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account