If you go to a startup, make sure you go for the right reasons.Greg Linden From BLOG@CACM | June 4, 2009 at 03:13 PM
From BLOG@CACM
In February, President Obama pegged Melissa Hathaway of the National Security Council to do a 60-day review of the nation’s cybersecurity policy. Midway through...Jeannette M. Wing From BLOG@CACM | June 2, 2009 at 02:46 PM
As more information moves to the Web, we need better tools to manage it. Today's tools focus on static Web pages. However, I claim that the Web is becoming a platform...Tessa Lau From BLOG@CACM | May 22, 2009 at 10:00 AM
Webopedia defines robotics as: The field of computer science and engineering concerned with creating robots, devices that can move and react to sensory input. Robotics...Carlos Brewer From BLOG@CACM | May 20, 2009 at 09:59 AM
One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...Jason Hong From BLOG@CACM | May 18, 2009 at 09:10 AM
The Media Computation approach to introductory computing is mostly used for creative expression, but it can also lead to some surprises.Mark Guzdial From BLOG@CACM | May 14, 2009 at 09:24 AM
The developing world has lots of women in computing. Great talks at this week's NCWIT meeting explain why the difference.Mark Guzdial From BLOG@CACM | May 14, 2009 at 10:20 AM
If you do research in computer science, you need to have a professional web page summarizing your research career. Let me tell you why it matters, and what information...Tessa Lau From BLOG@CACM | May 8, 2009 at 05:11 PM
If you find reading research papers unpleasant, difficult, and boring, maybe it is time to try doing it differently.Greg Linden From BLOG@CACM | May 8, 2009 at 12:19 PM
By definition, the raison d’être for high-performance computing is high performance, but floating point operations per second (FLOPS) need not be the only measure...Daniel Reed From BLOG@CACM | May 7, 2009 at 02:06 AM
How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.Jason Hong From BLOG@CACM | April 22, 2009 at 01:49 PM
Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...Jason Hong From BLOG@CACM | April 22, 2009 at 10:11 AM
The challenge of computing education today is convincing students that not every application is done and available for download.
Mark Guzdial From BLOG@CACM | April 18, 2009 at 09:41 AM
Evolution or revolution, it’s the persistent question. Can we build reliable esascale systems from extrapolations of current technology or will new approaches be...Daniel Reed From BLOG@CACM | April 11, 2009 at 07:51 PM
First part and introduction of an analysis to common problems faced by SE students in Latin America.
Carlos Brewer From BLOG@CACM | April 10, 2009 at 09:52 AM
So many processors on our desktops. Four cores, eight cores, soon we will see hundreds of cores. Almost all of them are going to be idle most of the time. If...Greg Linden From BLOG@CACM | April 9, 2009 at 12:48 PM
We rarely talk about computers as "Electronic Brains" or "Thinking Machines." That seems presumptuous or audacious today. Maybe that's exactly what we need to...Mark Guzdial From BLOG@CACM | March 29, 2009 at 10:38 AM
Short review of the results of the implementation of information technologies in latin american education
Carlos Brewer From BLOG@CACM | March 28, 2009 at 11:25 AM