Refine your search:

From BLOG@CACM
#### Safe Space for Alt-Views

Not everyone who questions computational hegemony is appealing to magic, mysticism, or divinity.

From BLOG@CACM
#### A Tale of a Non-Traditional Software Engineer

I entered college to study biomedical engineering, but realized more than halfway through I was more interested in computer science.

From BLOG@CACM
#### We Are Camille

Who is Camille Noûs, who has contributed to hundreds of papers on Google Scholar?

From BLOG@CACM
#### Tech Meetups In A Pandemic

By 2019, I generally thought there wasn't much that could surprise me about organizing meetups. Then Covid-19 hit. I was so wrong.

From BLOG@CACM
#### How Does One Divide with Napier's Rods?

Napier's multiplication and division rods, deriving from the basic multiplication table, simplify calculations considerably.

From BLOG@CACM
#### Protecting Enterprise Use of IoT

How to strengthen the security of the Internet of Things in organizations.

From BLOG@CACM
#### The Solar System from the Computational Thinking Perspective

We describe our choice of the solar system as one of the main illustrative examples used in our MOOC on computational thinking.

From BLOG@CACM
#### The Role of Computer Science in Elite Higher Education: Seeing the Expert Blind Spot

CS has an important role in preparing elite scientists, engineers, and mathematicians.

From BLOG@CACM
#### Design Orientation and Optimization

Considering how to concurrently maximize output via vertical and horizontal optimization.

From BLOG@CACM
#### How Does One Multiply with Napier's Rods?

Napier's multiplication and division rods, deriving from the basic multiplication table, simplify calculations considerably.

From BLOG@CACM
#### The Triad of Graduate Studies

The Research Community, Research Subject, and Research Process.

From BLOG@CACM
#### Software Learning: The Art Of Design Regret

How should software engineers try to classify their reflections?

From BLOG@CACM
#### Gaming the System: Definition

To game a programmed system means thwarting non-programmed intention.

From BLOG@CACM
#### A Standard Plan for Modern Requirements

The ambitious systems that we develop today need a proper requirements structure. The plan defined here organizes requirements specification along four books, the...

From BLOG@CACM
#### How Does One Calculate With A Circular Slide Rule?

The circular slide rule was widely used until the 1970s.

From BLOG@CACM
#### 10 Tips for Implementing Executable Exams

The focus is on executable exams for an Introduction to Computer Science course.

From BLOG@CACM
#### 20 Years of 'Software Engineering for Innovative Internet Applications'

Addressing the question: Why is software engineering part of the undergraduate computer science curriculum?

From BLOG@CACM
#### A Chance for Rebirth

Application of DECT technology in the concept of the Internet of Things.

From BLOG@CACM
#### Understanding NoSQL Database Types: Key Value

Of all non-relationals, the key-value store is by far the most popular due to its extreme simplicity.

From BLOG@CACM
#### Inclusive Integration of Computing in School Districts: Two Essential Tradeoffs

When integrating computer science and computational thinking in a school district through inclusive learning pathways, school district leaders face challenging...