Sign In

Communications of the ACM



Security Education Can Really Work (but Only If It's Done Right)
From [email protected]

Security Education Can Really Work (but Only If It's Done Right)

Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...

'there's an App For That,' and You Could Write It
From [email protected]

'there's an App For That,' and You Could Write It

The challenge of computing education today is convincing students that not every application is done and available for download.

Hello, Computer
From [email protected]

Hello, Computer

Reflections on the present and future of speech-based interfaces.

When Petascale Is Just Too Slow
From [email protected]

When Petascale Is Just Too Slow

Evolution or revolution, it’s the persistent question. Can we build reliable esascale systems from extrapolations of current technology or will new approaches be...

Common Problems of Se Students in Latin America, Part 1
From [email protected]

Common Problems of Se Students in Latin America, Part 1

First part and introduction of an analysis to common problems faced by SE students in Latin America.

What To Do With Those Idle Cores?
From [email protected]

What To Do With Those Idle Cores?

So many processors on our desktops.  Four cores, eight cores, soon we will see hundreds of cores.  Almost all of them are going to be idle most of the time.  If...

The Great Electronic Brain and the Rhetoric of Recruitment
From [email protected]

The Great Electronic Brain and the Rhetoric of Recruitment

We rarely talk about computers as "Electronic Brains" or "Thinking Machines." That seems presumptuous or audacious today.  Maybe that's exactly what we need to...

Results of It in Education.
From [email protected]

Results of It in Education.

Short review of the results of the implementation of information technologies in latin american education

What Is a Good Recommendation Algorithm?
From [email protected]

What Is a Good Recommendation Algorithm?

Someone may win the one million dollar Netflix Prize soon.  Will the winning algorithm produce movie recommendations that people like?

Social Wavicles and Personalized Flows
From [email protected]

Social Wavicles and Personalized Flows

The wavicle nature of our social existence provides a lens for understanding social filtering and its successes.  Still, this doesn't quite get us to truly effective...

The Importance of Programming in Introductory Computing Courses
From [email protected]

The Importance of Programming in Introductory Computing Courses

Why not teach introductory courses without programming?  Here are three good reasons to use programming to introduce computing.

Privacy As... Sharing More Information?
From [email protected]

Privacy As... Sharing More Information?

When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...

Connecting the Two Ends: Mobile Clouds
From [email protected]

Connecting the Two Ends: Mobile Clouds

  In 1959, the colorful and brilliant physicist, Richard Feynman, gave a seminal lecture to the American Physical Society entitled, "There's Plenty of Room at...

Canaima, Venezuela's Linux Distro Venezuela Ii
From [email protected]

Canaima, Venezuela's Linux Distro Venezuela Ii

Second part of Venezuela open source experience, this time a short talk about Canaima, the linux debian distro for public entities .

Dbmss For Science Applications: A Possible Solution
From [email protected]

Dbmss For Science Applications: A Possible Solution

Quite a few scientists who deal with the processing and storage of large amounts of data are unhappy with relational DBMSs. Here are several reasons why—and a possible...

Open Source in Latin America -Venezuela I
From [email protected]

Open Source in Latin America -Venezuela I

An introduction to open source and its applications in South America.

From [email protected]

Computers For Public Schools

It's been a while since several Latin countries decided to start programs to deliver computers and to connect all public schools to the Internet providing access...

Google Android Authentication
From [email protected]

Google Android Authentication

I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...

Three Misconceptions About Human-Computer Interaction
From [email protected]

Three Misconceptions About Human-Computer Interaction

Three misconceptions about the field of human-computer interaction, as observed by an AI researcher turned HCI researcher in a large corporate research lab

Making the Case For an ACM Fellow
From [email protected]

Making the Case For an ACM Fellow

Every year there are surely some qualified candidates for ACM Fellow who are rejected because their nomination and endorsements do not make the case as effectively...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account