acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Intellectual Amplification via Computing
From BLOG@CACM

Intellectual Amplification via Computing

As the recent performance of IBM's Watson system on the game show Jeopardy! illustrated, the combination of large-scale data, rich algorithm suites and powerful...

Works in Progress: MIA
From BLOG@CACM

Works in Progress: MIA

It is time we extracted a sample of cultural DNA from computing's history and engineered a new generation of contemplative, informal workshops. After gestation,...

To Videolecture or Not
From BLOG@CACM

To Videolecture or Not

Should conferences cover the cost of a videolecture or not?  I say "yes."

HPC and the Excluded Middle
From BLOG@CACM

HPC and the Excluded Middle

Betwixt and between ubiquitous consumer software and the ethereal realm of ultra-high-performance computing, lies the excluded middle, the world of day-to-day computational...

How Should Peer Review Evolve?
From BLOG@CACM

How Should Peer Review Evolve?

A simmering debate on peer review processes threatens to boil to the surface of various discussion forums for the scientific communities and the public at large...

Technology Transfer: A Contact Sport
From BLOG@CACM

Technology Transfer: A Contact Sport

The success or failure of technology transfer depends on many factors. No single mechanism is guaranteed to succeed, though there are many mechanisms that are likely...

Mind Meld in Group Decision Making
From BLOG@CACM

Mind Meld in Group Decision Making

Social computing remains a hot research topic, and basic research on understanding group decision making and conditions under which crowdsourcing can lead to advantages...

In Vivo, In Vitro, In Silico
From BLOG@CACM

In Vivo, In Vitro, In Silico

These “grand challenges” of systems biology encompass almost every aspect of modern computing, from numerical and symbolic methods through data management and analytics...

Web Applications Crave Memory
From BLOG@CACM

Web Applications Crave Memory

Big web applications are hungry for RAM.  They want lots of low power RAM.  And they want little else.

Consumerization of IT and Research
From BLOG@CACM

Consumerization of IT and Research

When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...

Social Media and the Twitter Backchannel at CHI2010
From BLOG@CACM

Social Media and the Twitter Backchannel at CHI2010

A marked difference at CHI 2010 compared to last year is the amount of research around social media and the use of social media during the conference.  These practices...

Time to Rethink Computer Science Education: The (Social) Web Changes Everything!
From BLOG@CACM

Time to Rethink Computer Science Education: The (Social) Web Changes Everything!

Let's rethink computer science education in face of Web 1.0, Web 2.0, and beyond. The Internet have changed everything we know about how computing is done.  It's...

Has the Spam War Been Won?
From BLOG@CACM

Has the Spam War Been Won?

A decade ago, e-mail spam was a severe problem.  Now, e-mail spam is barely noticeable.  After years of battles between spam filters and spammers creating new tricks...

Thinking Globally, Thinking Locally: Infrastructures For Collaboration
From BLOG@CACM

Thinking Globally, Thinking Locally: Infrastructures For Collaboration

What does it take for people to collaborate in spite of geographical, disciplinary and cultural differences?  This article looks at the work of two researchers...

Paucity to Plethora: Jevons Paradox
From BLOG@CACM

Paucity to Plethora: Jevons Paradox

I suspect much of computing is still socially conditioned by its roots in computational paucity to recognize fully the true opportunity afforded by computational...

What Will 2010 Bring?
From BLOG@CACM

What Will 2010 Bring?

What changes will we see in 2010 in computing?

Showcasing European Computer Science
From BLOG@CACM

Showcasing European Computer Science

Retrospective on the 2009 European Computer Science Summit and the launch of ACM Europe

The DARPA Network Challenge and the Design of Social Participation Systems
From BLOG@CACM

The DARPA Network Challenge and the Design of Social Participation Systems

What have we learned from the DARPA Network Challenge and the design of social participation systems?  The principal concern for designers of social participation...

The Ghosts of Holiday Shopping: Past, Present and Future
From BLOG@CACM

The Ghosts of Holiday Shopping: Past, Present and Future

In many parts of the western world, the frenzy of holiday shopping has reached its crescendo.  With apologies to Charles Dickens, it is instructive to consider...

The Rise of the External Brain
From BLOG@CACM

The Rise of the External Brain

From an entirely unexpected source, we begin to realize the dream of an external brain that supplements our knowledge, wisdom, and memories.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account