Sign In

Communications of the ACM

BLOG@CACM



The Impact of APCS on ­Undergraduate CS Enrollment
From BLOG@CACM

The Impact of APCS on ­Undergraduate CS Enrollment

The critics and detractors of the Advanced Placement exam in Computer Science (APCS) are many.  But the flaws of APCS most likely have no effect on undergraduate...

From BLOG@CACM

In February, President Obama pegged Melissa Hathaway of the National Security Council to do a 60-day review of the nation’s cybersecurity policy. Midway through...

Only the Developed World Lacks Women in Computing
From BLOG@CACM

Only the Developed World Lacks Women in Computing

The developing world has lots of women in computing. Great talks at this week's NCWIT meeting explain why the difference.

Security Education Can Really Work (but Only If It's Done Right)
From BLOG@CACM

Security Education Can Really Work (but Only If It's Done Right)

Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...

'There's an App For That,' and You Could Write It
From BLOG@CACM

'There's an App For That,' and You Could Write It

The challenge of computing education today is convincing students that not every application is done and available for download.

Common Problems of SE Students in Latin America, Part 1
From BLOG@CACM

Common Problems of SE Students in Latin America, Part 1

First part and introduction of an analysis to common problems faced by SE students in Latin America.

The Great Electronic Brain and the Rhetoric of Recruitment
From BLOG@CACM

The Great Electronic Brain and the Rhetoric of Recruitment

We rarely talk about computers as "Electronic Brains" or "Thinking Machines." That seems presumptuous or audacious today.  Maybe that's exactly what we need to...

Results of IT in Education
From BLOG@CACM

Results of IT in Education

Short review of the results of the implementation of information technologies in latin american education

What Is a Good Recommendation Algorithm?
From BLOG@CACM

What Is a Good Recommendation Algorithm?

Someone may win the one million dollar Netflix Prize soon.  Will the winning algorithm produce movie recommendations that people like?

Privacy As... Sharing More Information?
From BLOG@CACM

Privacy As... Sharing More Information?

When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...

Connecting the Two Ends: Mobile Clouds
From BLOG@CACM

Connecting the Two Ends: Mobile Clouds

  In 1959, the colorful and brilliant physicist, Richard Feynman, gave a seminal lecture to the American Physical Society entitled, "There's Plenty of Room at...

Canaima, Venezuela's Linux Distro Venezuela Ii
From BLOG@CACM

Canaima, Venezuela's Linux Distro Venezuela Ii

Second part of Venezuela open source experience, this time a short talk about Canaima, the linux debian distro for public entities .

DBMSs For Science Applications: A Possible Solution
From BLOG@CACM

DBMSs For Science Applications: A Possible Solution

Quite a few scientists who deal with the processing and storage of large amounts of data are unhappy with relational DBMSs. Here are several reasons why—and a possible...

Pipelining, Computing Innovation And Economic Growth
From BLOG@CACM

Pipelining, Computing Innovation And Economic Growth

In this economic downturn, as everyone looks with a wary eye at discretionary spending, it is instructive to consider the role of computing technology and innovation...

Open Source in Latin America
From BLOG@CACM

Open Source in Latin America

An introduction to open source and its applications in south america.

­Usable Privacy and Security
From BLOG@CACM

­Usable Privacy and Security

We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account