acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

International Competitors Head to Rapid City For ACM-ICPC
From BLOG@CACM

International Competitors Head to Rapid City For ACM-ICPC

Finalist teams from around the world descended on Rapid City, South Dakota this past weekend for the ACM-ICPC World Finals. Sightseeing and some cultural adjustments...

The Mythical Brooks Law
From BLOG@CACM

The Mythical Brooks Law

Yes, you can make a project less late by adding manpower. If you are a good manager.

Will Machine Learning Prevent ­S From Achieving the Goals of Teaching Computing to Everyone?
From BLOG@CACM

Will Machine Learning Prevent ­S From Achieving the Goals of Teaching Computing to Everyone?

At TURC, ACM leaders consider the future of AI, and I ask about the implications for computing education

Older Adults Learning Computer Programming: Motivations, Frustrations, and Design Opportunities
From BLOG@CACM

Older Adults Learning Computer Programming: Motivations, Frustrations, and Design Opportunities

I summarize the first known research study of older adults (aged 60 and over) learning computer programming.

Operating Systems as Possible Worlds
From BLOG@CACM

Operating Systems as Possible Worlds

Is a comparison between operating systems, which are analyzed by software engineers for conditional execution paths, and possible worlds, which are analyzed by...

Fact Over Fiction
From BLOG@CACM

Fact Over Fiction

Given a choice between the right to mass-disinform and democracy, I choose democracy.

Evaluating Computer Science ­Undergraduate Teaching: Why Student Evaluations Are Likely Biased
From BLOG@CACM

Evaluating Computer Science ­Undergraduate Teaching: Why Student Evaluations Are Likely Biased

Unconscious bias is pervasive in computing, and training is our best remedy, how can untrained students evaluate their CS teachers without bias?

Cyber Insecurity and Cyber Libertarianism
From BLOG@CACM

Cyber Insecurity and Cyber Libertarianism

Here we are, 70 years into the computer age and we still do not seem to know how to build secure information systems. And yet, our community marches forward with...

Generation CS: When ­Undergraduates Realized They Needed Computing
From BLOG@CACM

Generation CS: When ­Undergraduates Realized They Needed Computing

 A new Computing Research Association report describes the dramatic influx of undergraduates into computer science classes.

Cybersecurity in the Trump Era
From BLOG@CACM

Cybersecurity in the Trump Era

Deterrence is simply the wrong way to think about cybersecurity.

Ethical Theories Spotted in Silicon Valley
From BLOG@CACM

Ethical Theories Spotted in Silicon Valley

Some of the prevailing theories of ethics surface in modern high tech.  We take a quick and rather superficial look at their tracks on the ground, noting especially...

Just Press Reboot
From BLOG@CACM

Just Press Reboot

Why does the press continue to talk about "computer problems"?

Fact Versus Frivolity in Facebook
From BLOG@CACM

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.

ACM's Open-Conference Principle and Political Reality
From BLOG@CACM

ACM's Open-Conference Principle and Political Reality

The Open-Conference Principle is aimed at benefiting society.

The Work and Inspiration of the Commission on the History and Philosophy of Computing
From BLOG@CACM

The Work and Inspiration of the Commission on the History and Philosophy of Computing

The international organization HaPoC promotes and sponsors research that brings together the history and the philosophy of computing.

'Figure It Out' Isn't Enough: Striking a New Balance Between ­Understanding, Problem-Solving, and Design in Introductory CS Classes
From BLOG@CACM

'Figure It Out' Isn't Enough: Striking a New Balance Between ­Understanding, Problem-Solving, and Design in Introductory CS Classes

Intro CS courses should help students understand programs more and problem-solve less. 

Fiction as Model Theory
From BLOG@CACM

Fiction as Model Theory

Like model theory, fiction deploys a theory and an interpretation.  An interpretation that makes the statements of the theory true demonstrates consistency, in...

The Real Lesson of the Alleged Russian Hack
From BLOG@CACM

The Real Lesson of the Alleged Russian Hack

Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...

What Happened?
From BLOG@CACM

What Happened?

As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.

Null-Pointer Crashes, No More
From BLOG@CACM

Null-Pointer Crashes, No More

Void safety is a guarantee that no code will ever catch a reference with its pants down.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account