Sign In

Communications of the ACM

BLOG@CACM



Computers in Education Should Target Test Scores
From BLOG@CACM

Computers in Education Should Target Test Scores

Does it help to bring computers into the classroom? So far, there seems to be little evidence that it does.

Yes, Computer Scientists Are Hypercritical
From BLOG@CACM

Yes, Computer Scientists Are Hypercritical

Are computer scientists hypercritical? Are we more critical than scientists and engineers in other disciplines? Some numbers from the National Science Foundation...

Somebody
From BLOG@CACM

Somebody

Stanford University has very visibly started pushing mass teaching in AI,  machine learning, and databases.

The Modes and Uses of Scientific Publication
From BLOG@CACM

The Modes and Uses of Scientific Publication

Publication is about helping the advancement of humankind. Let us take this basis for granted and look at the other, possibly less glamorous aspects. Publication...

­U.K. Students Turned Into Goldfish By Social Networking
From BLOG@CACM

­U.K. Students Turned Into Goldfish By Social Networking

On the social networking obsession among U.K. students: It's the very air they breathe.

Gender Discrimination in the ­U.K. Research Excellence Framework
From BLOG@CACM

Gender Discrimination in the ­U.K. Research Excellence Framework

The U.K. research assessment framework will discriminate against female researchers. We can't afford to lose more women from CS research!

Why We Compute
From BLOG@CACM

Why We Compute

Why do we, as researchers and practitioners, have this deep and abiding love of computing? Why do we compute? I suspect it is a deeper, more primal yearning, one...

Password Policies Are Getting Out of Control
From BLOG@CACM

Password Policies Are Getting Out of Control

 At least 9 characters long. No repeated characters. At least 1 number, 1 special character, and 1 capital letter. Cannot be same as last 10 passwords. Must change...

The Nastiness Problem in Computer Science
From BLOG@CACM

The Nastiness Problem in Computer Science

Are we malevolent grumps? Nothing personal, but as a community computer scientists sometimes seem to succumb to negativism.

Game-Based Ideas Management in the Workplace
From BLOG@CACM

Game-Based Ideas Management in the Workplace

A brief discussion of ideas management software used by the U.K. government.

What We Owe Google, and What Google Owes ­Us
From BLOG@CACM

What We Owe Google, and What Google Owes ­Us

We rely on online information sources—maybe too much. What is our responsibility to make sure that they're accurate, and what responsibility do the sources have...

Being Bilingual: Speaking Technology and Policy
From BLOG@CACM

Being Bilingual: Speaking Technology and Policy

How do we cross the intellectual divide, providing technical advice to policy experts in ways that they find useful and actionable? Equally importantly, how do...

Improving Computer Science Research Collaborations Between U.S. and China
From BLOG@CACM

Improving Computer Science Research Collaborations Between U.S. and China

On March 23-24 2011, the National Science Foundation held a workshop looking at how to build more effective collaborations between computer science researchers...

Obama Administration Announces Landmark Global Internet Strategy
From BLOG@CACM

Obama Administration Announces Landmark Global Internet Strategy

The White House this week announced a comprehensive global strategy document bringing multiple agencies together in an effort to emphasize their commitment to a...

The Impact of Console Games in the Classroom
From BLOG@CACM

The Impact of Console Games in the Classroom

A summary of some interesting findings relating to the use of console games in Scottish primary and secondary school classrooms.

Information Privacy: Changing Norms and Expectations
From BLOG@CACM

Information Privacy: Changing Norms and Expectations

That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...

Why Have There Been So Many Security Breaches Recently?
From BLOG@CACM

Why Have There Been So Many Security Breaches Recently?

We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...

The Long Road to a Seat at the Table
From BLOG@CACM

The Long Road to a Seat at the Table

Computer science is still a new discipline compared to the rest of STEM. It will take a while for people to know what a "computer scientist" is in the same way...

A Successful NY Celebration of Women in Computing!
From BLOG@CACM

A Successful NY Celebration of Women in Computing!

A recap of our recent New York regional Celebration of Women in Computing.

Learning Through Twitter
From BLOG@CACM

Learning Through Twitter

Commentary on a recent study which evalauted the impact of Twitter on student engagement and grades.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account