Sign In

Communications of the ACM

BLOG@CACM



Heidelberg Laureate Forum: Who Invented the Computer?
From BLOG@CACM

Heidelberg Laureate Forum: Who Invented the Computer?

Comments after the first lecture by Prof. Raj Reddy at the Heidelberg Laureate Forum.

Heidelberg Laureate Forum: Meet Your Role Models
From BLOG@CACM

Heidelberg Laureate Forum: Meet Your Role Models

This blog posts highlights two of my favorite moments from the second day at the Heidelberg Laureate Forum. I had the pleasure of speaking with Vinton G. Cerf and...

Leaping the Exascale Chasm
From BLOG@CACM

Leaping the Exascale Chasm

The global race is on to build ever-faster supercomputers, fueled by a combination of scientific and engineering needs to simulate phenomena with greater resolution...

The World's Smartest Programmers Compete: ACM ICPC
From BLOG@CACM

The World's Smartest Programmers Compete: ACM ICPC

An introductory post with background on the ACM International Collegiate Programming Contest.

Athena Award Nominations Closing Soon!
From BLOG@CACM

Athena Award Nominations Closing Soon!

Don't miss out on the chance to nominate someone for an Athena Award from ACM-W.

Intermittent Net and Mobile/Cloud Development
From BLOG@CACM

Intermittent Net and Mobile/Cloud Development

Intermittent Net: The Importance of Distributed Thinking in Mobile/Cloud Application Development (and Usage)

Nomenclaturing: Let's Ture to the Max!
From BLOG@CACM

Nomenclaturing: Let's Ture to the Max!

Christos Papadimitriou's recently published reminiscences include the fascinating story of how he learned about Turing Machines: As a bored undergraduate in a Greek...

Data Mining the Web Via Crawling
From BLOG@CACM

Data Mining the Web Via Crawling

This post focuses on the data collection via crawling the web, by covering some of the challenges around collecting and discovering new content via a web crawler...

Online Higher Education
From BLOG@CACM

Online Higher Education

The higher education community is abuzz with debates regarding massive open online courses (MOOCs). This feels like a time of profound change, when the confluence...

Most Smartphone Apps Are Spyware
From BLOG@CACM

Most Smartphone Apps Are Spyware

Why does  this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?

SC11: The Cray, Fernbach, and Kennedy Awards
From BLOG@CACM

SC11: The Cray, Fernbach, and Kennedy Awards

The Cray, Fernbach, and Kennedy awards and the work of the recipients reflect the evolving interplay of technology, software, applications and algorithms in advancing...

Exciting New Research Presented at Grace Hopper
From BLOG@CACM

Exciting New Research Presented at Grace Hopper

The Grace Hopper Conference includes a Ph.D. Forum that showcases the research of current Ph.D. students, with the additional goal of providing support and mentoring...

A Connected Life
From BLOG@CACM

A Connected Life

In the Internet era, with cell phones, PDAs, and other technologies,  humans are more and more connected to each other. All day you can see people walking and at...

CFP: Intelligent Transportation Systems
From BLOG@CACM

CFP: Intelligent Transportation Systems

One of the goals of this years Computers Freedom and Privacy conference is to ask the question, "Can we be 'smart' and private?"  Wednesday's panel onIntellegent...

CFP: Activism and Social Networking Advocating For Privacy
From BLOG@CACM

CFP: Activism and Social Networking Advocating For Privacy

The Computers Freedom and Privacy Conference (CFP) continued Tuesday afternoon with a panel called Activism and Social Networking: Advocating for Privacy.  Panelists...

Internet Information Freedom Revisited.
From BLOG@CACM

Internet Information Freedom Revisited.

Many countries have started to control access to information on Internet for their citizens, most famous case being China, but Latin America does not escape this...

Learning from the DARPA Network Challenge
From BLOG@CACM

Learning from the DARPA Network Challenge

Part 3: Lessons Learned. This is the story of the Georgia Tech team's experiences in the DARPA Network Challenge, a competition designed to see how online social...

Has the Spam War Been Won?
From BLOG@CACM

Has the Spam War Been Won?

A decade ago, e-mail spam was a severe problem.  Now, e-mail spam is barely noticeable.  After years of battles between spam filters and spammers creating new tricks...

Finding DARPA's 10 Red Balloons
From BLOG@CACM

Finding DARPA's 10 Red Balloons

Part 2: Launch Day. This is the story of the Georgia Tech team's experiences in the DARPA Network Challenge, a competition designed to see how online social networks...

Preparing For the DARPA Network Challenge
From BLOG@CACM

Preparing For the DARPA Network Challenge

In late 2009 DARPA held its Network Challenge, a competition designed to see how online social networks could locate 10 red weather balloons moored throughout the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account