acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Operating Systems as Possible Worlds
From BLOG@CACM

Operating Systems as Possible Worlds

Is a comparison between operating systems, which are analyzed by software engineers for conditional execution paths, and possible worlds, which are analyzed by...

Fact Over Fiction
From BLOG@CACM

Fact Over Fiction

Given a choice between the right to mass-disinform and democracy, I choose democracy.

Evaluating Computer Science ­Undergraduate Teaching: Why Student Evaluations Are Likely Biased
From BLOG@CACM

Evaluating Computer Science ­Undergraduate Teaching: Why Student Evaluations Are Likely Biased

Unconscious bias is pervasive in computing, and training is our best remedy, how can untrained students evaluate their CS teachers without bias?

Generation CS: When ­Undergraduates Realized They Needed Computing
From BLOG@CACM

Generation CS: When ­Undergraduates Realized They Needed Computing

 A new Computing Research Association report describes the dramatic influx of undergraduates into computer science classes.

Cybersecurity in the Trump Era
From BLOG@CACM

Cybersecurity in the Trump Era

Deterrence is simply the wrong way to think about cybersecurity.

Just Press Reboot
From BLOG@CACM

Just Press Reboot

Why does the press continue to talk about "computer problems"?

Fact Versus Frivolity in Facebook
From BLOG@CACM

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.

ACM's Open-Conference Principle and Political Reality
From BLOG@CACM

ACM's Open-Conference Principle and Political Reality

The Open-Conference Principle is aimed at benefiting society.

Fiction as Model Theory
From BLOG@CACM

Fiction as Model Theory

Like model theory, fiction deploys a theory and an interpretation.  An interpretation that makes the statements of the theory true demonstrates consistency, in...

The Real Lesson of the Alleged Russian Hack
From BLOG@CACM

The Real Lesson of the Alleged Russian Hack

Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...

What Happened?
From BLOG@CACM

What Happened?

As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.

The Work and Inspiration of the APA Newsletter on Philosophy and Computers
From BLOG@CACM

The Work and Inspiration of the APA Newsletter on Philosophy and Computers

 The Newsletter of the Committee on Computing and Philosophy of the American Philosophical Association offers a wide range of scholarly work in the philosophy of...

Taking Incremental Steps Towards CS For All
From BLOG@CACM

Taking Incremental Steps Towards CS For All

U.S. states are developing novel, incremental approaches to CS for All.

Tech Industry Ph.D.s: Academia Can Be Nicer Than You Think
From BLOG@CACM

Tech Industry Ph.D.s: Academia Can Be Nicer Than You Think

If more Ph.D.s do not return to the academy, there will not be enough graduates capable of taking all those high tech jobs.

Stop Trying to Deter Cyberattacks
From BLOG@CACM

Stop Trying to Deter Cyberattacks

Whither cyber deterrence? In my view, let it wither.

Star Trek@50: Inspiring Discovery and Innovation
From BLOG@CACM

Star Trek@50: Inspiring Discovery and Innovation

Star Trek has inspired generations to pursue science and technology careers, not a few of whom have transformed part of it into technological and commercial fact...

The Work and Inspiration of the International Association For Computing and Philosophy
From BLOG@CACM

The Work and Inspiration of the International Association For Computing and Philosophy

A prominent player in the philosophy of computer science includes the two disciplines in its title.

A Presidential Policy Directive With Little Direction
From BLOG@CACM

A Presidential Policy Directive With Little Direction

Cybersecurity is integral in nature in a very connected world; the insecurity of some contributes to the vulnerability of all.

Does Nature ­Use Data?
From BLOG@CACM

Does Nature ­Use Data?

Does nature use databases? Does nature use data structures?  

Five Principles For Programming Languages For Learners
From BLOG@CACM

Five Principles For Programming Languages For Learners

Five considerations when choosing a programming language for schools
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account