Is a comparison between operating systems, which are analyzed by software engineers for conditional execution paths, and possible worlds, which are analyzed by...Robin K. Hill From BLOG@CACM | April 29, 2017 at 08:32 PM
Unconscious bias is pervasive in computing, and training is our best remedy, how can untrained students evaluate their CS teachers without bias?
Mark Guzdial From BLOG@CACM | April 23, 2017 at 09:11 PM
Here we are, 70 years into the computer age and we still do not seem to know how to build secure information systems. And yet, our community marches forward with...Moshe Y. Vardi From BLOG@CACM | April 14, 2017 at 09:07 AM
Some of the prevailing theories of ethics surface in modern high tech. We take a quick and rather superficial look at their tracks on the ground, noting especially...Robin K. Hill From BLOG@CACM | March 16, 2017 at 10:28 AM
Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.Robin K. Hill From BLOG@CACM | February 26, 2017 at 10:27 PM
Like model theory, fiction deploys a theory and an interpretation. An interpretation that makes the statements of the theory true demonstrates consistency, in...Robin K. Hill From BLOG@CACM | December 30, 2016 at 10:17 PM
Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...John Arquilla From BLOG@CACM | December 19, 2016 at 02:24 PM
As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.
Sheldon H. Jacobson, Jason J. Sauppe, and Steven E. Rigdon From BLOG@CACM | December 2, 2016 at 01:21 PM
The Newsletter of the Committee on Computing and Philosophy of the American Philosophical Association offers a wide range of scholarly work in the philosophy of...Robin K. Hill From BLOG@CACM | November 29, 2016 at 12:22 PM