acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Deciding When the Design is Wrong in Programming Languages and Education
From BLOG@CACM

Deciding When the Design is Wrong in Programming Languages and Education

When do we decide that errors are due to bad design in programming languges and education?

Tech Ethics at Work
From BLOG@CACM

Tech Ethics at Work

Ethics for Tech must address how professional issues play out in the workplace, in real life.

The Real Costs of a Computer Science Teacher Are Opportunity Costs, and Those Are Enormous
From BLOG@CACM

The Real Costs of a Computer Science Teacher Are Opportunity Costs, and Those Are Enormous

It is hard to convince people to become CS teachers (K–12 or University) when the opportunities elsewhere are so lucrative.

Human Acts and Computer Apps
From BLOG@CACM

Human Acts and Computer Apps

Our behaviors often seem to mimic the procedures that we induce in computers. What questions does that raise?

The Citadel and the Amusement Park
From BLOG@CACM

The Citadel and the Amusement Park

There are two kinds of Web sites.

The Birthplace of Artificial Intelligence?
From BLOG@CACM

The Birthplace of Artificial Intelligence?

Was the 1951 Paris conference "Les machines à calculer et la pensée humaine" the birthplace of Artificial Intelligence?

The Binary System Was Created Long Before Leibniz
From BLOG@CACM

The Binary System Was Created Long Before Leibniz

There are reports of much older number systems using only two symbols that have been developed mainly in Asia.

Student Liaison Program Debuts at SIGIR 2017
From BLOG@CACM

Student Liaison Program Debuts at SIGIR 2017

The SIGIR Student Liaison Program supports an environment in which all students thrive.

The Rise of Strategic Cyberwar?
From BLOG@CACM

The Rise of Strategic Cyberwar?

Cyberwar is not simply a lineal descendant of strategic air power; rather, it is the next face of battle.

It's Not the 'Why' Chromosome, It's the 'How'
From BLOG@CACM

It's Not the 'Why' Chromosome, It's the 'How'

Women do like the raw technical aspects of computer science.

Learning Programming at Scale
From BLOG@CACM

Learning Programming at Scale

I summarize my first three years of research as an assistant professor on studying and building tools to support people who are learning computer programming.

Deep Dictionary
From BLOG@CACM

Deep Dictionary

The abstraction from big data on English words of distributed vector representations computing simple semantic aspects has drawn interest from the computing community...

Older Adults Learning Computer Programming: Motivations, Frustrations, and Design Opportunities
From BLOG@CACM

Older Adults Learning Computer Programming: Motivations, Frustrations, and Design Opportunities

I summarize the first known research study of older adults (aged 60 and over) learning computer programming.

Fact Over Fiction
From BLOG@CACM

Fact Over Fiction

Given a choice between the right to mass-disinform and democracy, I choose democracy.

Cybersecurity in the Trump Era
From BLOG@CACM

Cybersecurity in the Trump Era

Deterrence is simply the wrong way to think about cybersecurity.

Fact Versus Frivolity in Facebook
From BLOG@CACM

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.

What Happened?
From BLOG@CACM

What Happened?

As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.

Null-Pointer Crashes, No More
From BLOG@CACM

Null-Pointer Crashes, No More

Void safety is a guarantee that no code will ever catch a reference with its pants down.

Database Decay and What To Do About It
From BLOG@CACM

Database Decay and What To Do About It

In our opinion, database decay results from the multi-department organization of large implementations.

Stop Trying to Deter Cyberattacks
From BLOG@CACM

Stop Trying to Deter Cyberattacks

Whither cyber deterrence? In my view, let it wither.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account