Sign In

Communications of the ACM

BLOG@CACM



Protecting Enterprise Use of IoT
From BLOG@CACM

Protecting Enterprise Use of IoT

How to strengthen the security of the Internet of Things in organizations.

How Does One Multiply with Napier's Rods?
From BLOG@CACM

How Does One Multiply with Napier's Rods?

Napier's multiplication and division rods, deriving from the basic multiplication table, simplify calculations considerably.

Software Learning: The Art Of Design Regret
From BLOG@CACM

Software Learning: The Art Of Design Regret

How should software engineers try to classify their reflections?

How Does One Calculate With A Circular Slide Rule?
From BLOG@CACM

How Does One Calculate With A Circular Slide Rule?

The circular slide rule was widely used until the 1970s.

10 Tips for Implementing Executable Exams
From BLOG@CACM

10 Tips for Implementing Executable Exams

The focus is on executable exams for an Introduction to Computer Science course.

Is Computing a Team Sport?
From BLOG@CACM

Is Computing a Team Sport?

I take a peek at the history of computing to see if pioneering early developments were the results of team effort.

Understanding NoSQL Database Types: Document
From BLOG@CACM

Understanding NoSQL Database Types: Document

Document databases are particularly useful in app development.

Science-Changing Code
From BLOG@CACM

Science-Changing Code

The case of NumPy.

Charles Babbage and the Loom
From BLOG@CACM

Charles Babbage and the Loom

Babbage wanted to control his analytical engine, regarded as the ancestor of the modern-day computer, with punched cards.

Understanding NoSQL Database Types: Graph Databases
From BLOG@CACM

Understanding NoSQL Database Types: Graph Databases

SQL represents data stored in rows and tables, while high-growth NoSQL is data stores arranged via nested documents as columnar schemas or key-value pairs. One...

Misnomer and Malgorithm
From BLOG@CACM

Misnomer and Malgorithm

The algorithm should be respected; the malgorithm should be rejected.

AI or Intelligence Augmentation for Education?
From BLOG@CACM

AI or Intelligence Augmentation for Education?

Applications of artificial intelligence to education are spreading and intensifying, but we have the acronym backwards. Building ethical, equitable applications...

NoSQL vs. SQL
From BLOG@CACM

NoSQL vs. SQL

Broadly, NoSQL has an absence of strict schemas for entities/attributes, while SQL rigidly relates/regulates the two.  

When Did the Digital Age Begin?
From BLOG@CACM

When Did the Digital Age Begin?

There is no clear answer.

The Skills Students Gain in Online Learning
From BLOG@CACM

The Skills Students Gain in Online Learning

The Corona Year as an opportunity for science and engineering students to practice 21st century skills.

Superb Historical Robots
From BLOG@CACM

Superb Historical Robots

The world's most magnificent historical robots.

Birthday Bit Boundaries
From BLOG@CACM

Birthday Bit Boundaries

Which birthdays would have special significance if our culture were binary-based instead of decimal-based?

Why Focus on Technologies for Human Learning?
From BLOG@CACM

Why Focus on Technologies for Human Learning?

By choosing human learning as a topic area, computer scientists can contribute to major societal challenges, win grants in additional programs, and tackle new computer...

How Do You Calculate on the Abacus?
From BLOG@CACM

How Do You Calculate on the Abacus?

Considering the use of one of the most long-lived calculating devices.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account