acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

CFP: Opening Plenary Privacy and Free Speech
From BLOG@CACM

CFP: Opening Plenary Privacy and Free Speech

The opening plenary of this year's Computers Freedom and Privacy Conference (CFP) had a decidedly business orientation.  Titled "Privacy and Free Speech: It's Good...

Are You Invisible?
From BLOG@CACM

Are You Invisible?

If you sit in your office and just focus on doing your work, you’re invisible, Patty Azzarello says. Here’s her career advice on how to be recognized at your work...

Robots: From 'What If' to 'Now That'
From BLOG@CACM

Robots: From 'What If' to 'Now That'

Our panel at CFP will explore how robotics implicates civil liberties today, and in the near term. We will discuss issues from the ethical ramifications of robots...

Laptops in the Classroom
From BLOG@CACM

Laptops in the Classroom

Thoughts about using laptops in higher education classes, relating to a recent journal article about what students actually do with their laptops in class while...

Research Summers
From BLOG@CACM

Research Summers

Research challenges us to pose new questions, choose exploratory avenues carefully, and be frugal and wise stewards of the financial trust invested in us. 

Virtual Education: One More Step to Close the Gap
From BLOG@CACM

Virtual Education: One More Step to Close the Gap

Is virtual education a feasible option to deliver rich educational contents to country side zones where no traditional schools are available?

Online Information Brokers & the Challenges of Privacy in a Networked World
From BLOG@CACM

Online Information Brokers & the Challenges of Privacy in a Networked World

At Privacy Rights Clearinghouse, we receive phone calls and emails about online information brokers almost daily. The individuals who contact us are often those...

Computers, Freedom, and Privacy in a Networked Society: June 15-18, in San Jose and Cyberspace
From BLOG@CACM

Computers, Freedom, and Privacy in a Networked Society: June 15-18, in San Jose and Cyberspace

With Facebook privacy on the cover of Time magazine and Google being investigated in Europe and the US after admitting that they collected information from home...

How Many Computers Will You Own?
From BLOG@CACM

How Many Computers Will You Own?

How many computing devices will you have in ten years? Two? Six? Just one?

Albion College Eliminates Computer Science
From BLOG@CACM

Albion College Eliminates Computer Science

Albion College decides to eliminate the computer science major due to budget cuts and low enrollment, because it's not really part of 21st century work.

The Complicated Issues of Computing Education in Qatar
From BLOG@CACM

The Complicated Issues of Computing Education in Qatar

The ACM Education Board visited Qatar at the beginning of May.  At Qatar University, 70% of the students in CS are women, and those we met are hungry to produce...

On FIFA World Cup 2010: Football and Internet in Latin America
From BLOG@CACM

On FIFA World Cup 2010: Football and Internet in Latin America

Quick view on how the FIFA Football World Cup will affect Internet in Latin America.

Choosing Successful Research
From BLOG@CACM

Choosing Successful Research

How to choose research projects that are more likely to be successful.

Malvertisements Growing as Online Security Threat
From BLOG@CACM

Malvertisements Growing as Online Security Threat

Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...

Successful Software Platforms Are the Byproducts of Successful Businesses
From BLOG@CACM

Successful Software Platforms Are the Byproducts of Successful Businesses

Startups need their current business to be successful and self-sustaining before they place serious effort in building a general software platform.

On Social Networks, Political Campaigns and Threats
From BLOG@CACM

On Social Networks, Political Campaigns and Threats

 Brief discussion on how social networks are now the battlefield of political campaigns, death threats and more.

What Security Advice Should We Give?
From BLOG@CACM

What Security Advice Should We Give?

Are people being rational when they ignore the security advice we give them?  If so, what advice should we give them that they would not ignore?

Personal Factories
From BLOG@CACM

Personal Factories

Since several years ago, with the beginning of nanoscience, the idea having of micro factories, like household microwave ovens, is floating in the air.

Consumerization of IT and Research
From BLOG@CACM

Consumerization of IT and Research

When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...

Turns out That Brain Training Games Don't Work
From BLOG@CACM

Turns out That Brain Training Games Don't Work

A brief article pointing to a new large scale study published in Nature about the effect of brain training games.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account