Sign In

Communications of the ACM

BLOG@CACM



The Era of Hackers Is Over
From BLOG@CACM

The Era of Hackers Is Over

The ability to hack algorithms and make data structures optimal was a virtue of programmers a few decades ago. The current reality is much different, with the ability...

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica
From BLOG@CACM

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica

The road to the Cambridge Analytica/Facebook scandal is strewn with failures.

Time To End The vi/Emacs Debate
From BLOG@CACM

Time To End The vi/Emacs Debate

If you still use Emacs, I feel for you. Perhaps it is time to give vi a try.

Deciding When the Design is Wrong in Programming Languages and Education
From BLOG@CACM

Deciding When the Design is Wrong in Programming Languages and Education

When do we decide that errors are due to bad design in programming languges and education?

Tech Ethics at Work
From BLOG@CACM

Tech Ethics at Work

Ethics for Tech must address how professional issues play out in the workplace, in real life.

The Real Costs of a Computer Science Teacher Are Opportunity Costs, and Those Are Enormous
From BLOG@CACM

The Real Costs of a Computer Science Teacher Are Opportunity Costs, and Those Are Enormous

It is hard to convince people to become CS teachers (K–12 or University) when the opportunities elsewhere are so lucrative.

Human Acts and Computer Apps
From BLOG@CACM

Human Acts and Computer Apps

Our behaviors often seem to mimic the procedures that we induce in computers. What questions does that raise?

The Citadel and the Amusement Park
From BLOG@CACM

The Citadel and the Amusement Park

There are two kinds of Web sites.

The Birthplace of Artificial Intelligence?
From BLOG@CACM

The Birthplace of Artificial Intelligence?

Was the 1951 Paris conference "Les machines à calculer et la pensée humaine" the birthplace of Artificial Intelligence?

The Binary System Was Created Long Before Leibniz
From BLOG@CACM

The Binary System Was Created Long Before Leibniz

There are reports of much older number systems using only two symbols that have been developed mainly in Asia.

Student Liaison Program Debuts at SIGIR 2017
From BLOG@CACM

Student Liaison Program Debuts at SIGIR 2017

The SIGIR Student Liaison Program supports an environment in which all students thrive.

The Rise of Strategic Cyberwar?
From BLOG@CACM

The Rise of Strategic Cyberwar?

Cyberwar is not simply a lineal descendant of strategic air power; rather, it is the next face of battle.

It's Not the 'Why' Chromosome, It's the 'How'
From BLOG@CACM

It's Not the 'Why' Chromosome, It's the 'How'

Women do like the raw technical aspects of computer science.

Learning Programming at Scale
From BLOG@CACM

Learning Programming at Scale

I summarize my first three years of research as an assistant professor on studying and building tools to support people who are learning computer programming.

Deep Dictionary
From BLOG@CACM

Deep Dictionary

The abstraction from big data on English words of distributed vector representations computing simple semantic aspects has drawn interest from the computing community...

Older Adults Learning Computer Programming: Motivations, Frustrations, and Design Opportunities
From BLOG@CACM

Older Adults Learning Computer Programming: Motivations, Frustrations, and Design Opportunities

I summarize the first known research study of older adults (aged 60 and over) learning computer programming.

Fact Over Fiction
From BLOG@CACM

Fact Over Fiction

Given a choice between the right to mass-disinform and democracy, I choose democracy.

Cybersecurity in the Trump Era
From BLOG@CACM

Cybersecurity in the Trump Era

Deterrence is simply the wrong way to think about cybersecurity.

Fact Versus Frivolity in Facebook
From BLOG@CACM

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.

What Happened?
From BLOG@CACM

What Happened?

As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account