Sign In

Communications of the ACM



Scientists Convene at First Computational Sustainability Meeting
From [email protected]

Scientists Convene at First Computational Sustainability Meeting

 Keynote Address at the First Computational Sustainability Meeting by Carla Gomes.

Windmills in the Water
From [email protected]

Windmills in the Water

A call to the computer science community for what a research agenda might look like for the role of information and communications technologies in energy, the environment...

E-Government in Latin America
From [email protected]

E-Government in Latin America

According to wikipedia: e-Government  is a diffused neologism used to refer to the use of information and communication technology to provide and improve government...

The Impact of Apcs on Undergraduate CS Enrollment
From [email protected]

The Impact of Apcs on Undergraduate CS Enrollment

The critics and detractors of the Advanced Placement exam in Computer Science (APCS) are many.  But the flaws of APCS most likely have no effect on undergraduate...

The Siren Song of Startups
From [email protected]

The Siren Song of Startups

If you go to a startup, make sure you go for the right reasons.

From [email protected]

In February, President Obama pegged Melissa Hathaway of the National Security Council to do a 60-day review of the nation’s cybersecurity policy. Midway through...

Building a Smarter Web
From [email protected]

Building a Smarter Web

As more information moves to the Web, we need better tools to manage it. Today's tools focus on static Web pages. However, I claim that the Web is becoming a platform...

Robotics in South America
From [email protected]

Robotics in South America

Webopedia defines robotics as: The field of computer science and engineering concerned with creating robots, devices that can move and react to sensory input. Robotics...

Helping Younger People Protect Themselves from Security Attacks
From [email protected]

Helping Younger People Protect Themselves from Security Attacks

One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...

Media Computation: For Creativity and Surprises
From [email protected]

Media Computation: For Creativity and Surprises

The Media Computation approach to introductory computing is mostly used for creative expression, but it can also lead to some surprises.

Only the Developed World Lacks Women in Computing
From [email protected]

Only the Developed World Lacks Women in Computing

The developing world has lots of women in computing. Great talks at this week's NCWIT meeting explain why the difference.

Visibility Matters: Why You Need a Professional Web Page
From [email protected]

Visibility Matters: Why You Need a Professional Web Page

If you do research in computer science, you need to have a professional web page summarizing your research career.  Let me tell you why it matters, and what information...

Enjoying Reading Research
From [email protected]

Enjoying Reading Research

If you find reading research papers unpleasant, difficult, and boring, maybe it is time to try doing it differently.

High-Performance Computing: Where
From [email protected]

High-Performance Computing: Where

By definition, the raison d’être for high-performance computing is high performance, but floating point operations per second (FLOPS) need not be the only measure...

Common Problems of Se Students in Latin America, Part 2
From [email protected]

Common Problems of Se Students in Latin America, Part 2

Second part of this analysis of common problems faced by SE students in Latin America.

Designing Effective Security Warnings
From [email protected]

Designing Effective Security Warnings

How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.

Security Education Can Really Work (but Only If It's Done Right)
From [email protected]

Security Education Can Really Work (but Only If It's Done Right)

Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...

'there's an App For That,' and You Could Write It
From [email protected]

'there's an App For That,' and You Could Write It

The challenge of computing education today is convincing students that not every application is done and available for download.

Hello, Computer
From [email protected]

Hello, Computer

Reflections on the present and future of speech-based interfaces.

When Petascale Is Just Too Slow
From [email protected]

When Petascale Is Just Too Slow

Evolution or revolution, it’s the persistent question. Can we build reliable esascale systems from extrapolations of current technology or will new approaches be...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account