Sign In

Communications of the ACM

BLOG@CACM



First-Year Research Sources
From BLOG@CACM

First-Year Research Sources

Identifying publications for first-year research requires some digging and some non-standard choices.

Trolleyspotting
From BLOG@CACM

Trolleyspotting

The Trolley Problem is not for solving, but for exploring.

Computing Ethics and Teaching It
From BLOG@CACM

Computing Ethics and Teaching It

Ethics can and should be presented to computer science students in appropriate ways.

Variable Vagaries
From BLOG@CACM

Variable Vagaries

The variable, construed as an L-value, makes some offbeat appearances.

FictionStein
From BLOG@CACM

FictionStein

Science fiction like Frankenstein nudges readers to confer humanity but nudges them away from moral fortitude.

Tech U­ser Responsibility
From BLOG@CACM

Tech U­ser Responsibility

User support presents serious challenges that are aggravated by indeterminate client responsibility.

Examples of Phenomenology in Computing
From BLOG@CACM

Examples of Phenomenology in Computing

The branch of philosophy known as phenomenology can broaden our understanding of what is really going on in the tasks we address with computing.

The Work and Inspiration of the APA Newsletter on Philosophy and Computers
From BLOG@CACM

The Work and Inspiration of the APA Newsletter on Philosophy and Computers

 The Newsletter of the Committee on Computing and Philosophy of the American Philosophical Association offers a wide range of scholarly work in the philosophy of...

The Work and Inspiration of the International Association For Computing and Philosophy
From BLOG@CACM

The Work and Inspiration of the International Association For Computing and Philosophy

A prominent player in the philosophy of computer science includes the two disciplines in its title.

Does Nature ­Use Data?
From BLOG@CACM

Does Nature ­Use Data?

Does nature use databases? Does nature use data structures?  
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account