acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Whence Machine Volition?
From BLOG@CACM

Whence Machine Volition?

How could a computer develop or even express volition?

Students Speak to Ethical Issues
From BLOG@CACM

Students Speak to Ethical Issues

What are the concerns of students after study of computer ethics?

Cryptocurs Don't Asportate
From BLOG@CACM

Cryptocurs Don't Asportate

Cryptocurrency on a blockchain cannot be stolen -- it's true.

Experiencing Loops in Time
From BLOG@CACM

Experiencing Loops in Time

We don't experience program loops as blocks, started over, because time is one-way.

Safe Space for Alt-Views
From BLOG@CACM

Safe Space for Alt-Views

Not everyone who questions computational hegemony is appealing to magic, mysticism, or divinity.

Gaming the System: Definition
From BLOG@CACM

Gaming the System: Definition

To game a programmed system means thwarting non-programmed intention.

Now What? Order and Test
From BLOG@CACM

Now What? Order and Test

Exploring minimal control flow operations ends in flowcharts.

Misnomer and Malgorithm
From BLOG@CACM

Misnomer and Malgorithm

The algorithm should be respected; the malgorithm should be rejected.

First-Year Research Sources
From BLOG@CACM

First-Year Research Sources

Identifying publications for first-year research requires some digging and some non-standard choices.

Deadlines of the Digital Turn
From BLOG@CACM

Deadlines of the Digital Turn

Sometimes the digital turn forces us to designate things that aren't there.

Trolleyspotting
From BLOG@CACM

Trolleyspotting

The Trolley Problem is not for solving, but for exploring.

Computing Ethics and Teaching It
From BLOG@CACM

Computing Ethics and Teaching It

Ethics can and should be presented to computer science students in appropriate ways.

The Virus Analogy and Validation
From BLOG@CACM

The Virus Analogy and Validation

The comparison between organic viruses and computer viruses is compelling.  But why?

Voting as Tallying in Public
From BLOG@CACM

Voting as Tallying in Public

Voting requires common acknowledgement.  Can that be achieved in automation?

The Vote as a Declared Datum
From BLOG@CACM

The Vote as a Declared Datum

A vote is a datum that sheds its original identity but persists.

Voting, Coding, and the Code
From BLOG@CACM

Voting, Coding, and the Code

Voting is more than counting.

Vice Epistemology of the Internet
From BLOG@CACM

Vice Epistemology of the Internet

How can we apply virtue epistemology to the problem of fake news?

Lessons from a First-Year Seminar
From BLOG@CACM

Lessons from a First-Year Seminar

Teaching a first-year seminar to a mixed group musters the basics of computer science.

Variable Vagaries
From BLOG@CACM

Variable Vagaries

The variable, construed as an L-value, makes some offbeat appearances.

The Artificialistic Fallacy
From BLOG@CACM

The Artificialistic Fallacy

Ethics discussions of artificial intelligence reveal a fallacy of omission.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account