acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Understanding NoSQL Database Types: Column
From BLOG@CACM

Understanding NoSQL Database Types: Column

The elements of one of the most used and popular data designs around.

Charles Babbage and the Loom
From BLOG@CACM

Charles Babbage and the Loom

Babbage wanted to control his analytical engine, regarded as the ancestor of the modern-day computer, with punched cards.

An Open Call to Establish an  Interdisciplinary Data Science Education Journal
From BLOG@CACM

An Open Call to Establish an Interdisciplinary Data Science Education Journal

In this blog, we describe our vision for a journal that would focus on data science education from the interdisciplinarity perceptive.

From U-boats to 'U-bots'
From BLOG@CACM

From U-boats to 'U-bots'

Considering the outlook for undersea cyberwar.

Computing Education Is Not the Same as Engineering Education
From BLOG@CACM

Computing Education Is Not the Same as Engineering Education

Learning Engineering is not always about Becoming an Engineer. Computing Education outside of Engineering Education is bigger than the part inside.

What Happened to Watson Health?
From BLOG@CACM

What Happened to Watson Health?

A case study in portfolio management.

Understanding NoSQL Database Types: Graph Databases
From BLOG@CACM

Understanding NoSQL Database Types: Graph Databases

SQL represents data stored in rows and tables, while high-growth NoSQL is data stores arranged via nested documents as columnar schemas or key-value pairs. One...

The World's Most Magnificent Historical Calculating Machines
From BLOG@CACM

The World's Most Magnificent Historical Calculating Machines

The design of today's electronic computers is usually not very appealing, in contrast to magnificent mechanical calculating machines from earlier times.

Misnomer and Malgorithm
From BLOG@CACM

Misnomer and Malgorithm

The algorithm should be respected; the malgorithm should be rejected.

Anna Karenina On Development Methodologies
From BLOG@CACM

Anna Karenina On Development Methodologies

The quest for development productivity.

AI or Intelligence Augmentation for Education?
From BLOG@CACM

AI or Intelligence Augmentation for Education?

Applications of artificial intelligence to education are spreading and intensifying, but we have the acronym backwards. Building ethical, equitable applications...

The World's Most Magnificent Historical Automatons
From BLOG@CACM

The World's Most Magnificent Historical Automatons

Automatons are ubiquitous. Some of the most magnificent works in the genre have survived in museums.

Is the Pandemic Affecting Science and Engineering Undergraduate Students?
From BLOG@CACM

Is the Pandemic Affecting Science and Engineering Undergraduate Students?

The importance of the students’ voice.

NoSQL vs. SQL
From BLOG@CACM

NoSQL vs. SQL

Broadly, NoSQL has an absence of strict schemas for entities/attributes, while SQL rigidly relates/regulates the two.  

Tips for Successful Examinations in the Age of Remote Education
From BLOG@CACM

Tips for Successful Examinations in the Age of Remote Education

Rather than fancying you can control Internet access, design exams to reward students who won't need it.

How I Evaluate a College Computer Science Teaching Record
From BLOG@CACM

How I Evaluate a College Computer Science Teaching Record

Teaching is a skill, and the best teachers use the best methods.

Lessons From and For Online Teaching
From BLOG@CACM

Lessons From and For Online Teaching

The troika model for successful online teaching.

When Did the Digital Age Begin?
From BLOG@CACM

When Did the Digital Age Begin?

There is no clear answer.

The Skills Students Gain in Online Learning
From BLOG@CACM

The Skills Students Gain in Online Learning

The Corona Year as an opportunity for science and engineering students to practice 21st century skills.

Auditing AI and Autonomous Systems; Building an Infrastructure of Trust
From BLOG@CACM

Auditing AI and Autonomous Systems; Building an Infrastructure of Trust

How do we build trust? How can we systematically assure trust in our systems? How would auditing AI and autonomous systems contribute to this goal? Explaining...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account