Sign In

Communications of the ACM

BLOG@CACM



Can Randomly Generated Code Fix Software Bugs?
From BLOG@CACM

Can Randomly Generated Code Fix Software Bugs?

Can the principles of evolution be applied to software code and used to improve it? Stephanie Forrest thinks so—and has some encouraging data to prove it.  

Fixing the Process of Computer Science Refereeing
From BLOG@CACM

Fixing the Process of Computer Science Refereeing

There is a simple way to make refereeing better, almost overnight. It takes a bit of courage, but it would restore honesty and quality to the process.

Technology Transfer: A Contact Sport
From BLOG@CACM

Technology Transfer: A Contact Sport

The success or failure of technology transfer depends on many factors. No single mechanism is guaranteed to succeed, though there are many mechanisms that are likely...

Barbara Liskov Keynote Grace Hopper Conference
From BLOG@CACM

Barbara Liskov Keynote Grace Hopper Conference

In her Grace Hopper keynote talk, Barbar Liskov reflected on her research journey and the work for which she was given the Turing Award.

Talking With PCAST
From BLOG@CACM

Talking With PCAST

I told three stories at PCAST — The Google Story, Model Checking, and Machine Learning — as a way to illustrate the importance of sustained federal funding of basic...

Simple HPC Wins
From BLOG@CACM

Simple HPC Wins

You want to be the first person to design a successful, transistorized computer system, not the last person to design vacuum tube computer.  Any designer's challenge...

From BLOG@CACM

The First ACM Symposium on Cloud Computing (SoCC)

Earlier this summer the first ACM Symposium on Cloud Computing was held in Indianapolis, Indiana. With three stellar keynotes and an exceptional program, the inaugural...

Why Is Great Design So Hard?
From BLOG@CACM

Why Is Great Design So Hard?

Why is good design so hard to accomplish for organizations? People are coming to the realization that design really matters, but it's not that they don't want to...

In Vivo, In Vitro, In Silico
From BLOG@CACM

In Vivo, In Vitro, In Silico

These “grand challenges” of systems biology encompass almost every aspect of modern computing, from numerical and symbolic methods through data management and analytics...

Web Applications Crave Memory
From BLOG@CACM

Web Applications Crave Memory

Big web applications are hungry for RAM.  They want lots of low power RAM.  And they want little else.

The Future of Electronic Design Automation, According to IBM
From BLOG@CACM

The Future of Electronic Design Automation, According to IBM

To paraphrase Mr. Meyerson: A truly talented engineer is someone who, when his hand gets slammed in a doorway and is badly hurt, inserts his other hand in the doorway...

Malvertisements Growing as Online Security Threat
From BLOG@CACM

Malvertisements Growing as Online Security Threat

Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...

On Social Networks, Political Campaigns and Threats
From BLOG@CACM

On Social Networks, Political Campaigns and Threats

 Brief discussion on how social networks are now the battlefield of political campaigns, death threats and more.

Consumerization of IT and Research
From BLOG@CACM

Consumerization of IT and Research

When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...

Internet Information Freedom Revisited.
From BLOG@CACM

Internet Information Freedom Revisited.

Many countries have started to control access to information on Internet for their citizens, most famous case being China, but Latin America does not escape this...

A Personal View of the Future of Personal Computing
From BLOG@CACM

A Personal View of the Future of Personal Computing

The future of computers will be created by a conjunction of several key aspects of technology.

Investigating Old Problems in a New Light at CSCW, Day 2
From BLOG@CACM

Investigating Old Problems in a New Light at CSCW, Day 2

This post will give a summary of one paper each from sessions on Groupware Technologies, the experimental CSCW Horizons, and Everyday Healthcare.

Paucity to Plethora: Jevons Paradox
From BLOG@CACM

Paucity to Plethora: Jevons Paradox

I suspect much of computing is still socially conditioned by its roots in computational paucity to recognize fully the true opportunity afforded by computational...

What Will 2010 Bring?
From BLOG@CACM

What Will 2010 Bring?

What changes will we see in 2010 in computing?

Showcasing European Computer Science
From BLOG@CACM

Showcasing European Computer Science

Retrospective on the 2009 European Computer Science Summit and the launch of ACM Europe
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account