At the First Conference on Computational Sustainability, Cornell's Evan Cooch, evolutionary ecologist, describes what happened in the past when he asked an engineer...Karen A. Frenkel From BLOG@CACM | June 10, 2009 at 02:46 PM
Environmental scientists are unaware of advances in computational complexity and have been limiting problems they tackle, but they are hopeful as result of First...Karen A. Frenkel From BLOG@CACM | June 10, 2009 at 04:18 PM
Dutch Scientists create digital "collective intelligence" system to compare photos of animals' markings. Karen A. Frenkel From BLOG@CACM | June 9, 2009 at 02:41 PM
University of Washington and Carnegie Mellon researchers are building sensors for phones and homes that give people feedback on their habits and encourage them...Karen A. Frenkel From BLOG@CACM | June 9, 2009 at 02:45 PM
There is an old joke in the high-performance computing community that begins with a question, “How do you make a small fortune in high-performance computing?” There...Daniel Reed From BLOG@CACM | June 9, 2009 at 10:21 AM
A call to the computer science community for what a research agenda might look like for the role of information and communications technologies in energy, the environment...Jeannette M. Wing From BLOG@CACM | June 7, 2009 at 09:11 AM
According to wikipedia: e-Government is a diffused neologism used to refer to the use of information and communication technology to provide and improve government...Carlos Brewer From BLOG@CACM | June 6, 2009 at 10:10 AM
The critics and detractors of the Advanced Placement exam in Computer Science (APCS) are many. But the flaws of APCS most likely have no effect on undergraduate...Mark Guzdial From BLOG@CACM | June 4, 2009 at 09:22 AM
From BLOG@CACM
In February, President Obama pegged Melissa Hathaway of the National Security Council to do a 60-day review of the nation’s cybersecurity policy. Midway through...Jeannette M. Wing From BLOG@CACM | June 2, 2009 at 02:46 PM
The developing world has lots of women in computing. Great talks at this week's NCWIT meeting explain why the difference.Mark Guzdial From BLOG@CACM | May 14, 2009 at 10:20 AM
Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...Jason Hong From BLOG@CACM | April 22, 2009 at 10:11 AM
The challenge of computing education today is convincing students that not every application is done and available for download.
Mark Guzdial From BLOG@CACM | April 18, 2009 at 09:41 AM
First part and introduction of an analysis to common problems faced by SE students in Latin America.
Carlos Brewer From BLOG@CACM | April 10, 2009 at 09:52 AM
We rarely talk about computers as "Electronic Brains" or "Thinking Machines." That seems presumptuous or audacious today. Maybe that's exactly what we need to...Mark Guzdial From BLOG@CACM | March 29, 2009 at 10:38 AM
Short review of the results of the implementation of information technologies in latin american education
Carlos Brewer From BLOG@CACM | March 28, 2009 at 11:25 AM
Someone may win the one million dollar Netflix Prize soon. Will the winning algorithm produce movie recommendations that people like?Greg Linden From BLOG@CACM | March 24, 2009 at 12:05 PM
When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...Jason Hong From BLOG@CACM | March 18, 2009 at 10:23 AM
In 1959, the colorful and brilliant physicist, Richard Feynman, gave a seminal lecture to the American Physical Society entitled, "There's Plenty of Room at...Daniel Reed From BLOG@CACM | March 17, 2009 at 07:34 PM