Sign In

Communications of the ACM



E-Government in Latin America
From [email protected]

E-Government in Latin America

According to wikipedia: e-Government  is a diffused neologism used to refer to the use of information and communication technology to provide and improve government...

The Impact of APCS on ­Undergraduate CS Enrollment
From [email protected]

The Impact of APCS on ­Undergraduate CS Enrollment

The critics and detractors of the Advanced Placement exam in Computer Science (APCS) are many.  But the flaws of APCS most likely have no effect on undergraduate...

From [email protected]

In February, President Obama pegged Melissa Hathaway of the National Security Council to do a 60-day review of the nation’s cybersecurity policy. Midway through...

Only the Developed World Lacks Women in Computing
From [email protected]

Only the Developed World Lacks Women in Computing

The developing world has lots of women in computing. Great talks at this week's NCWIT meeting explain why the difference.

Security Education Can Really Work (but Only If It's Done Right)
From [email protected]

Security Education Can Really Work (but Only If It's Done Right)

Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...

'There's an App For That,' and You Could Write It
From [email protected]

'There's an App For That,' and You Could Write It

The challenge of computing education today is convincing students that not every application is done and available for download.

Common Problems of SE Students in Latin America, Part 1
From [email protected]

Common Problems of SE Students in Latin America, Part 1

First part and introduction of an analysis to common problems faced by SE students in Latin America.

The Great Electronic Brain and the Rhetoric of Recruitment
From [email protected]

The Great Electronic Brain and the Rhetoric of Recruitment

We rarely talk about computers as "Electronic Brains" or "Thinking Machines." That seems presumptuous or audacious today.  Maybe that's exactly what we need to...

Results of IT in Education
From [email protected]

Results of IT in Education

Short review of the results of the implementation of information technologies in latin american education

What Is a Good Recommendation Algorithm?
From [email protected]

What Is a Good Recommendation Algorithm?

Someone may win the one million dollar Netflix Prize soon.  Will the winning algorithm produce movie recommendations that people like?

Privacy As... Sharing More Information?
From [email protected]

Privacy As... Sharing More Information?

When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...

Connecting the Two Ends: Mobile Clouds
From [email protected]

Connecting the Two Ends: Mobile Clouds

  In 1959, the colorful and brilliant physicist, Richard Feynman, gave a seminal lecture to the American Physical Society entitled, "There's Plenty of Room at...

Canaima, Venezuela's Linux Distro Venezuela Ii
From [email protected]

Canaima, Venezuela's Linux Distro Venezuela Ii

Second part of Venezuela open source experience, this time a short talk about Canaima, the linux debian distro for public entities .

DBMSs For Science Applications: A Possible Solution
From [email protected]

DBMSs For Science Applications: A Possible Solution

Quite a few scientists who deal with the processing and storage of large amounts of data are unhappy with relational DBMSs. Here are several reasons why—and a possible...

Pipelining, Computing Innovation And Economic Growth
From [email protected]

Pipelining, Computing Innovation And Economic Growth

In this economic downturn, as everyone looks with a wary eye at discretionary spending, it is instructive to consider the role of computing technology and innovation...

Open Source in Latin America
From [email protected]

Open Source in Latin America

An introduction to open source and its applications in south america.

­Usable Privacy and Security
From [email protected]

­Usable Privacy and Security

We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account