Sign In

Communications of the ACM

BLOG@CACM



The Internet of Things and the Future of Virus Detection and Prevention
From BLOG@CACM

The Internet of Things and the Future of Virus Detection and Prevention

Leveraging the Internet of Things in indoor environments could help prevent highly infectious diseases from spreading rapidly in today’s global world.

Clean Code Isn’t Enough; It Must Be Crystal Clear, Too
From BLOG@CACM

Clean Code Isn’t Enough; It Must Be Crystal Clear, Too

Writing clean code is a great start, but for programmers who really want to master their craft, you have to go further. You need to write clear code that other...

Why IT Professionals Get A Bad Rap For Their Communications
From BLOG@CACM

Why IT Professionals Get A Bad Rap For Their Communications

Tips for improving business IT communications.

The Internet at 50
From BLOG@CACM

The Internet at 50

A personalized take on three things we have to celebrate about the Internet today.

Evolution Through Revolution: Getting Your Team to Embrace Change
From BLOG@CACM

Evolution Through Revolution: Getting Your Team to Embrace Change

Don't accept the status quo. Instead, build a team willing to fight for positive change.

Lazy Developers Are the Best Developers
From BLOG@CACM

Lazy Developers Are the Best Developers

Lazy developers stick to the project scope while forcing the project team to understand and fix their own code and issues.

Hazardous Enthusiasm and How Eagerness Can Kill A Project
From BLOG@CACM

Hazardous Enthusiasm and How Eagerness Can Kill A Project

Many otherwise competent software developers and potential contributors end up being overwhelmed by "hazardous enthusiasm." They end up overwhelmed by their excitement...

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica
From BLOG@CACM

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica

The road to the Cambridge Analytica/Facebook scandal is strewn with failures.

Massive Retaliation 2.0
From BLOG@CACM

Massive Retaliation 2.0

Reacting to the U.S. Nuclear Posture Review, which now tries to extend nuclear deterrence to cyberspace.

The Citadel and the Amusement Park
From BLOG@CACM

The Citadel and the Amusement Park

There are two kinds of Web sites.

Keynotes at SIGIR 2017
From BLOG@CACM

Keynotes at SIGIR 2017

This article summarizes the keynotes in the main session and from the Workshop on Conversational Approaches to Information Retrieval.

Fact Over Fiction
From BLOG@CACM

Fact Over Fiction

Given a choice between the right to mass-disinform and democracy, I choose democracy.

Star Trek@50: Inspiring Discovery and Innovation
From BLOG@CACM

Star Trek@50: Inspiring Discovery and Innovation

Star Trek has inspired generations to pursue science and technology careers, not a few of whom have transformed part of it into technological and commercial fact...

The Emerging Technology Landscape in China
From BLOG@CACM

The Emerging Technology Landscape in China

Observations about the emerging technology landscape in China, looking at mobile social networking, mobile payments, taxi hailing, and same or next day delivery...

California's Internet Voting Initiatives
From BLOG@CACM

California's Internet Voting Initiatives

The vast majority of computer and network security experts agree that there is currently no way to adequately secure an online public election.

SIGGRAPH Presents 2015 Awards
From BLOG@CACM

SIGGRAPH Presents 2015 Awards

Five are honored for exceptional achievements in computer graphics and interactive techniques.

Exascale Computing and Big Data: Time To Reunite
From BLOG@CACM

Exascale Computing and Big Data: Time To Reunite

It is past time to reunite the big data, cloud, and high-performance computing communities. Each can each learn much from the other.

From Russia, Without Love
From BLOG@CACM

From Russia, Without Love

Considering Russia's alleged involvement in international cyber incidents, and its willingness to stop them.

Meet A.I. Joe
From BLOG@CACM

Meet A.I. Joe

In the 70 years since the end of World War II, AI has advanced enormously, and the military has continued to show a steady appetite for acquiring lethal robots....

Budget Beowulf Clusters
From BLOG@CACM

Budget Beowulf Clusters

At SIGCSE 2015, five CS educators brought and live-demo'd the low-cost Beowulf clusters they had built for teaching parallel and distributed computing.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account