From BLOG@CACM
Generative AI may turn out to be disruptive technologies for computer science education, but generative AI can also be conceived…
Ority Hazzan and Yael Erez| September 18, 2023
As the recent performance of IBM's Watson system on the game show Jeopardy! illustrated, the combination of large-scale data, rich algorithm suites and powerful...Daniel Reed From BLOG@CACM | February 18, 2011 at 04:17 PM
It is time we extracted a sample of cultural DNA from computing's history and engineered a new generation of contemplative, informal workshops. After gestation,...Daniel Reed From BLOG@CACM | January 5, 2011 at 04:30 PM
Betwixt and between ubiquitous consumer software and the ethereal realm of ultra-high-performance computing, lies the excluded middle, the world of day-to-day computational...Daniel Reed From BLOG@CACM | October 24, 2010 at 09:20 PM
A simmering debate on peer review processes threatens to boil to the surface of various discussion forums for the scientific communities and the public at large...Ed H. Chi From BLOG@CACM | October 18, 2010 at 09:22 PM
The success or failure of technology transfer depends on many factors. No single mechanism is guaranteed to succeed, though there are many mechanisms that are likely...Daniel Reed From BLOG@CACM | October 4, 2010 at 09:47 PM
Social computing remains a hot research topic, and basic research on understanding group decision making and conditions under which crowdsourcing can lead to advantages...Ed H. Chi From BLOG@CACM | September 1, 2010 at 04:22 PM
These “grand challenges” of systems biology encompass almost every aspect of modern computing, from numerical and symbolic methods through data management and analytics...Daniel Reed From BLOG@CACM | July 17, 2010 at 09:40 AM
Big web applications are hungry for RAM. They want lots of low power RAM. And they want little else.Greg Linden From BLOG@CACM | July 9, 2010 at 03:42 PM
When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...Daniel Reed From BLOG@CACM | April 24, 2010 at 09:56 AM
A marked difference at CHI 2010 compared to last year is the amount of research around social media and the use of social media during the conference. These practices...Ed H. Chi From BLOG@CACM | April 15, 2010 at 12:00 PM
Let's rethink computer science education in face of Web 1.0, Web 2.0, and beyond. The Internet have changed everything we know about how computing is done. It's...Ed H. Chi From BLOG@CACM | April 1, 2010 at 10:09 AM
A decade ago, e-mail spam was a severe problem. Now, e-mail spam is barely noticeable. After years of battles between spam filters and spammers creating new tricks...Greg Linden From BLOG@CACM | March 4, 2010 at 01:43 PM
What does it take for people to collaborate in spite of geographical, disciplinary and cultural differences? This article looks at the work of two researchers...Erika S. Poole From BLOG@CACM | February 11, 2010 at 10:16 AM
I suspect much of computing is still socially conditioned by its roots in computational paucity to recognize fully the true opportunity afforded by computational...Daniel Reed From BLOG@CACM | February 8, 2010 at 09:33 AM
What have we learned from the DARPA Network Challenge and the design of social participation systems? The principal concern for designers of social participation...Ed H. Chi From BLOG@CACM | December 31, 2009 at 05:12 PM
In many parts of the western world, the frenzy of holiday shopping has reached its crescendo. With apologies to Charles Dickens, it is instructive to consider...Daniel Reed From BLOG@CACM | December 23, 2009 at 03:52 PM
From an entirely unexpected source, we begin to realize the dream of an external brain that supplements our knowledge, wisdom, and memories.Greg Linden From BLOG@CACM | December 14, 2009 at 04:22 PM