Sign In

Communications of the ACM

BLOG@CACM



It's Not the 'Why' Chromosome, It's the 'How'
From BLOG@CACM

It's Not the 'Why' Chromosome, It's the 'How'

Women do like the raw technical aspects of computer science.

Learning Programming at Scale
From BLOG@CACM

Learning Programming at Scale

I summarize my first three years of research as an assistant professor on studying and building tools to support people who are learning computer programming.

Deep Dictionary
From BLOG@CACM

Deep Dictionary

The abstraction from big data on English words of distributed vector representations computing simple semantic aspects has drawn interest from the computing community...

Older Adults Learning Computer Programming: Motivations, Frustrations, and Design Opportunities
From BLOG@CACM

Older Adults Learning Computer Programming: Motivations, Frustrations, and Design Opportunities

I summarize the first known research study of older adults (aged 60 and over) learning computer programming.

Fact over Fiction
From BLOG@CACM

Fact over Fiction

Given a choice between the right to mass-disinform and democracy, I choose democracy.

Cybersecurity in the Trump Era
From BLOG@CACM

Cybersecurity in the Trump Era

Deterrence is simply the wrong way to think about cybersecurity.

Fact Versus Frivolity in Facebook
From BLOG@CACM

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users. ...

What Happened?
From BLOG@CACM

What Happened?

As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.

Null-pointer Crashes, No More
From BLOG@CACM

Null-pointer Crashes, No More

Void safety is a guarantee that no code will ever catch a reference with its pants down.

Database Decay and What To Do About It
From BLOG@CACM

Database Decay and What To Do About It

In our opinion, database decay results from the multi-department organization of large implementations.

Stop Trying to Deter Cyberattacks
From BLOG@CACM

Stop Trying to Deter Cyberattacks

Whither cyber deterrence? In my view, let it wither.

Star Trek@50: Inspiring Discovery and Innovation
From BLOG@CACM

Star Trek@50: Inspiring Discovery and Innovation

Star Trek has inspired generations to pursue science and technology careers, not a few of whom have transformed part of it into technological and commercial fact...

Does Nature Use Data?
From BLOG@CACM

Does Nature Use Data?

Does nature use databases? Does nature use data structures?  

The Emerging Technology Landscape in China
From BLOG@CACM

The Emerging Technology Landscape in China

Observations about the emerging technology landscape in China, looking at mobile social networking, mobile payments, taxi hailing, and same or next day delivery...

And the 2016 ICPC Winner is….
From BLOG@CACM

And the 2016 ICPC Winner is….

The results are in for the 2016 ACM-ICPC World Finals

Welcome to the 40th Annual ACM-ICPC World Finals in Phuket, Thailand
From BLOG@CACM

Welcome to the 40th Annual ACM-ICPC World Finals in Phuket, Thailand

The ACM International Collegiate Programming Contest, sponsored by IBM, is the oldest, largest, and most prestigious programming competition in the world.

Wax Woz, Stan Lee, and 30,000 Close Friends
From BLOG@CACM

Wax Woz, Stan Lee, and 30,000 Close Friends

Last weekend, Steve Wozniak and Stan Lee launched the first annual Silicon Valley Comic Con.

California's Internet Voting Initiatives
From BLOG@CACM

California's Internet Voting Initiatives

The vast majority of computer and network security experts agree that there is currently no way to adequately secure an online public election.

SIGGRAPH Presents 2015 Awards
From BLOG@CACM

SIGGRAPH Presents 2015 Awards

Five are honored for exceptional achievements in computer graphics and interactive techniques.

SF Reading for Computer Scientists: Summer 2015
From BLOG@CACM

SF Reading for Computer Scientists: Summer 2015

Summer reading recommendations for computer scientists, courtesy of the SIGCSE 2015 Using Science Fiction in CS Courses BOF.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account