Sign In

Communications of the ACM

BLOG@CACM



A Software Architect Is the Person You Blame
From BLOG@CACM

A Software Architect Is the Person You Blame

How efficient is your current software project, and could it potentially benefit from the addition of a software architect?

Validating Beneficial AI
From BLOG@CACM

Validating Beneficial AI

The foundational work of the first AI for Good Summit allows the AI community to work together to create an infrastructure for responsible communication, development...

My First Interaction, Design, and Children Conference, IDC 2018
From BLOG@CACM

My First Interaction, Design, and Children Conference, IDC 2018

IDC 2018 was a fun conference with lots of great insights.

The Real Problem With AI
From BLOG@CACM

The Real Problem With AI

It's algorithms. And data. They can be wrong.

From 007 to 'Agent 111'
From BLOG@CACM

From 007 to 'Agent 111'

James Bond-like spies have been eclipsed by a new generation of operatives who don't travel the world (not physically, anyway) or drink martinis, shaken or stirred...

The Goal of Software Testing
From BLOG@CACM

The Goal of Software Testing

Finding errors is not the same strategy as making sure that a product works.

­Until the Craze Fades
From BLOG@CACM

­Until the Craze Fades

Too much, perhaps, of a good thing?

Teaching Two Programming Languages in the First CS Course
From BLOG@CACM

Teaching Two Programming Languages in the First CS Course

Should we teach two different programming languages in the first CS course?  Probably not -- here's what we know.

Articulation of Decision Responsibility
From BLOG@CACM

Articulation of Decision Responsibility

Can we establish a locution for the results of a program that does not ascribe decision-making power?

Why Not Program Right?
From BLOG@CACM

Why Not Program Right?

Not your grandmother's class invariant.

When Will  We Learn?
From BLOG@CACM

When Will We Learn?

Massive software failure once again, with no lesson from past occurrences and no lesson for future systems.

ACM Public Policy ­Update: 100-Day Highlights
From BLOG@CACM

ACM Public Policy ­Update: 100-Day Highlights

Chronicling the First 100 Days this year of ACM's member-driven policy efforts in Europe and the U.S.

The Era of Hackers Is Over
From BLOG@CACM

The Era of Hackers Is Over

The ability to hack algorithms and make data structures optimal was a virtue of programmers a few decades ago. The current reality is much different, with the ability...

End Anonymous Refereeing
From BLOG@CACM

End Anonymous Refereeing

Who came up with this bizarre idea?

Integrating CS to Improve Scores in Math, Science, and English Language Arts: New Result from Code.org and Outliers
From BLOG@CACM

Integrating CS to Improve Scores in Math, Science, and English Language Arts: New Result from Code.org and Outliers

Evidence from Broward County of integrated CS curriculum having an impact on standardized tests 

Examples of Phenomenology in Computing
From BLOG@CACM

Examples of Phenomenology in Computing

The branch of philosophy known as phenomenology can broaden our understanding of what is really going on in the tasks we address with computing.

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica
From BLOG@CACM

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica

The road to the Cambridge Analytica/Facebook scandal is strewn with failures.

Securing Threats to Election Systems
From BLOG@CACM

Securing Threats to Election Systems

Election systems are supposed to be disconnected from the Internet, for obvious and sensible reasons. Most elections today, however, use computers.

Time To End The vi/Emacs Debate
From BLOG@CACM

Time To End The vi/Emacs Debate

If you still use Emacs, I feel for you. Perhaps it is time to give vi a try.

A Computing Education Research Perspective on Programmable Programming Languages
From BLOG@CACM

A Computing Education Research Perspective on Programmable Programming Languages

Computing education researcher take on the implications of programmable programming languages
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account