acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

What Security Advice Should We Give?
From BLOG@CACM

What Security Advice Should We Give?

Are people being rational when they ignore the security advice we give them?  If so, what advice should we give them that they would not ignore?

Personal Factories
From BLOG@CACM

Personal Factories

Since several years ago, with the beginning of nanoscience, the idea having of micro factories, like household microwave ovens, is floating in the air.

Consumerization of IT and Research
From BLOG@CACM

Consumerization of IT and Research

When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...

Turns out That Brain Training Games Don't Work
From BLOG@CACM

Turns out That Brain Training Games Don't Work

A brief article pointing to a new large scale study published in Nature about the effect of brain training games.

Robots After Roomba: The Ethics of Electronic Companions
From BLOG@CACM

Robots After Roomba: The Ethics of Electronic Companions

As robots become woven into the fabric of daily life, what ethical issues will the world face?

What Makes a Good HCI Systems Paper?
From BLOG@CACM

What Makes a Good HCI Systems Paper?

 Proposing a standard for reviewing HCI systems papers.

World of Warcraft-Playing Professors
From BLOG@CACM

World of Warcraft-Playing Professors

Are academics taking serious games too seriously?

Social Media and the Twitter Backchannel at CHI2010
From BLOG@CACM

Social Media and the Twitter Backchannel at CHI2010

A marked difference at CHI 2010 compared to last year is the amount of research around social media and the use of social media during the conference.  These practices...

CHI 2010: ­User Interfaces Learn a Thing or Two
From BLOG@CACM

CHI 2010: ­User Interfaces Learn a Thing or Two

The 2010 conference in Human Factors in Computing Systems has seen a noticeable uptick in projects on and engagement with machine learning.

CHI 2010 Opening Plenary: Thinking About Messy Futures
From BLOG@CACM

CHI 2010 Opening Plenary: Thinking About Messy Futures

"Messy Futures: Culture, Technology and Research" was the title of Genevieve Bell’s opening plenary speech at CHI 2010, and it gave attendees a plethora of facts...

Encouraging Girls to Study Geeky Subjects (part 2): Programmable Bracelets
From BLOG@CACM

Encouraging Girls to Study Geeky Subjects (part 2): Programmable Bracelets

Some thoughts about novel ways to attract girls to study computing: e-textiles and computational crafts.

Internet Information Freedom Revisited.
From BLOG@CACM

Internet Information Freedom Revisited.

Many countries have started to control access to information on Internet for their citizens, most famous case being China, but Latin America does not escape this...

Cleaving Computer Science Into New Degrees
From BLOG@CACM

Cleaving Computer Science Into New Degrees

Computer science is becoming too broad to fit under the tyranny of a single bachelors degree.  Cleaving the BS in CS into new degrees is a natural growth path.

Connecting Computing Education Research to Practice
From BLOG@CACM

Connecting Computing Education Research to Practice

The SIGCSE 2010 keynotes by Sally Fincher and Carl Weiman suggest how we connect research to changing practice.  It's complicated!  It's enculturation. 

Encouraging Girls to Study Geeky Subjects (Part 1): Emotionally Intelligent Tutoring Systems
From BLOG@CACM

Encouraging Girls to Study Geeky Subjects (Part 1): Emotionally Intelligent Tutoring Systems

The first in a couple of articles in which I look at some ways of encouraging girls to engage with technical subjects; this focuses on an emotionally sensitive...

Errors in Database Systems, Eventual Consistency, and the CAP Theorem
From BLOG@CACM

Errors in Database Systems, Eventual Consistency, and the CAP Theorem

Recently, there has been considerable renewed interest in the CAP theorem for database management system (DBMS) applications that span multiple processing sites...

Electronic Voting Systems
From BLOG@CACM

Electronic Voting Systems

 What are the implications of electronic voting? Which countries are using this system? What are the advantages of using such systems? And what are the problems...

Time to Rethink Computer Science Education: The (Social) Web Changes Everything!
From BLOG@CACM

Time to Rethink Computer Science Education: The (Social) Web Changes Everything!

Let's rethink computer science education in face of Web 1.0, Web 2.0, and beyond. The Internet have changed everything we know about how computing is done.  It's...

How Much Software Testing Is Enough?
From BLOG@CACM

How Much Software Testing Is Enough?

Investing in a large amount of software testing can be difficult to justify, particularly for a startup company. How much software testing is enough?

Computing and the Common Core
From BLOG@CACM

Computing and the Common Core

Computer science education gets a boost from an historic document released by governors and education leaders in the United States and you can show your support...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account