acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

The End of Freedom on Internet?
From BLOG@CACM

The End of Freedom on Internet?

Recent news on media reveals a tendency in several countries: Internet censorship and more. 

The 'No SQL' Discussion Has Nothing to Do With SQL
From BLOG@CACM

The 'No SQL' Discussion Has Nothing to Do With SQL

Recently, there has been a lot of buzz about "No SQL" databases. This blog post considers the performance argument about No SQL databases; a subsequent posting...

Taming the Clouds at OOPSLA
From BLOG@CACM

Taming the Clouds at OOPSLA

OOPSLA 2009 workshops started yesterday (Sunday Oct 25th)  and featured two workshops on Cloud Computing.  The presence of a diverse audience led to many interesting...

Impact of the Social Web on Computing Research
From BLOG@CACM

Impact of the Social Web on Computing Research

Scientists from diverse fields are feeling the impact of Social Web systems and are publishing research papers that characterize, model, prototype, and evaluate...

Collective Intelligence: a Fad or Real Research?
From BLOG@CACM

Collective Intelligence: a Fad or Real Research?

A recent trend in HCI research is the extension of the long time goal of augmenting human intelligence to "augmenting social intelligence."  That is, enabling not...

Smart Grids: Getting Personal
From BLOG@CACM

Smart Grids: Getting Personal

How many electronic devices do you own? It is tempting to answer, “Just a handful,” but the truth is much more nuanced. Here’s a simple experiment that will (quite...

Bridging Cultures For Collaboration
From BLOG@CACM

Bridging Cultures For Collaboration

All too often, our technical curricula fail to focus on the human aspect of cross-domain collaboration. Technical skills are necessary, but not sufficient. One...

The End of a DBMS Era (Might Be ­Upon ­Us)
From BLOG@CACM

The End of a DBMS Era (Might Be ­Upon ­Us)

Relational database management systems (DBMSs) have been remarkably successful in capturing the DBMS marketplace. To a first approximation they are “the only game...

Designing Effective Interfaces For ­Usable Privacy and Security
From BLOG@CACM

Designing Effective Interfaces For ­Usable Privacy and Security

I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...

Windmills in the Water
From BLOG@CACM

Windmills in the Water

A call to the computer science community for what a research agenda might look like for the role of information and communications technologies in energy, the environment...

Results of IT in Education
From BLOG@CACM

Results of IT in Education

Short review of the results of the implementation of information technologies in latin american education

What Is a Good Recommendation Algorithm?
From BLOG@CACM

What Is a Good Recommendation Algorithm?

Someone may win the one million dollar Netflix Prize soon.  Will the winning algorithm produce movie recommendations that people like?

DBMSs For Science Applications: A Possible Solution
From BLOG@CACM

DBMSs For Science Applications: A Possible Solution

Quite a few scientists who deal with the processing and storage of large amounts of data are unhappy with relational DBMSs. Here are several reasons why—and a possible...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account