Sign In

Communications of the ACM



SF Reading For Computer Scientists: Summer 2015
From [email protected]

SF Reading For Computer Scientists: Summer 2015

Summer reading recommendations for computer scientists, courtesy of the SIGCSE 2015 Using Science Fiction in CS Courses BOF.

The Ethics of Cyberwar
From [email protected]

The Ethics of Cyberwar

Under what conditions should one engage in cyberwar? How should such a conflict be waged?

From Russia, Without Love
From [email protected]

From Russia, Without Love

Considering Russia's alleged involvement in international cyber incidents, and its willingness to stop them.

The Babble of Computing Education: Diverse Perspectives, Confusing Definitions
From [email protected]

The Babble of Computing Education: Diverse Perspectives, Confusing Definitions

 A wide range of differing definitions and diverse adoptions in computing education make it hard to understand and define

Day Two at the ACM-ICPC World Finals
From [email protected]

Day Two at the ACM-ICPC World Finals

A look at the second day of the ACM-ICPC World Finals in Morocco.

A Taste of CHI Interactivity in Seoul
From [email protected]

A Taste of CHI Interactivity in Seoul

Observations from CHI 2015, the first SIGCHI annual conference held in Asia.

Meet A.I. Joe
From [email protected]

Meet A.I. Joe

In the 70 years since the end of World War II, AI has advanced enormously, and the military has continued to show a steady appetite for acquiring lethal robots....

The Life of a Computer Pioneer
From [email protected]

The Life of a Computer Pioneer

Obituary of F.L. Bauer, German informatics pioneer.

Computer Security and the Risks of Online Voting
From [email protected]

Computer Security and the Risks of Online Voting

An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it is being used.

The Three Faces of Cyberwar
From [email protected]

The Three Faces of Cyberwar

The different aspects of cyberwar, and what can be done about them.

Battling Bias
From ACM News

Battling Bias

A regional Grace Hopper Celebration event this week focused on "advancing a gender diverse technology workforce in New York."

And That's a Wrap: SIGCSE 2015 Ends
From [email protected]

And That's a Wrap: SIGCSE 2015 Ends

The third and final day of the 46th annual ACM Technical Symposium on Computer Science Education concluded with more technical information and a very informative...

SIGCSE Day 2 Highlights
From [email protected]

SIGCSE Day 2 Highlights

Reporting on the second day of the 46th annual ACM Technical Symposium on Computer Science Education. An entertaining keynote and the most popular topics of the...

SIGCSE Day 1 Is in the Books
From [email protected]

SIGCSE Day 1 Is in the Books

It was a successful start to the 46th ACM Technical Symposium on Computer Science Education (SIGCSE) in Kansas City, MO.

What Are The Best STEM Careers in 2015?
From [email protected]

What Are The Best STEM Careers in 2015?

According to U.S. News & World Report: Money, the top four STEM careers (and nine of the top 20) are all in computing.

Socializing with Robots at Ginza
From [email protected]

Socializing with Robots at Ginza

Modern social robots are making their debut in our daily lives.

Launching a New Girls Who Code Chapter
From [email protected]

Launching a New Girls Who Code Chapter

What is involved in starting a new Girls Who Code club?

Recommended SF Reading For Computer Scientists
From [email protected]

Recommended SF Reading For Computer Scientists

Courtesy of a SIGCSE 2014 BOF, here are some SF books containing themes of special interest to computer scientists.

The Role of Tech Firms in Computing Education
From [email protected]

The Role of Tech Firms in Computing Education

Computing education can't be about jobs. It has to be about schools to reach everyone.

Yet Another Major Data Breach, But Will This Time Be Any Different?
From [email protected]

Yet Another Major Data Breach, But Will This Time Be Any Different?

Why is our community having such an anemic response to all of these major data breaches? What can we do differently? What should we be doing differently?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account