Sign In

Communications of the ACM

BLOG@CACM



The Binary System Was Created Long Before Leibniz
From BLOG@CACM

The Binary System Was Created Long Before Leibniz

There are reports of much older number systems using only two symbols that have been developed mainly in Asia.

Student Liaison Program Debuts at SIGIR 2017
From BLOG@CACM

Student Liaison Program Debuts at SIGIR 2017

The SIGIR Student Liaison Program supports an environment in which all students thrive.

The Rise of Strategic Cyberwar?
From BLOG@CACM

The Rise of Strategic Cyberwar?

Cyberwar is not simply a lineal descendant of strategic air power; rather, it is the next face of battle.

It's Not the 'Why' Chromosome, It's the 'How'
From BLOG@CACM

It's Not the 'Why' Chromosome, It's the 'How'

Women do like the raw technical aspects of computer science.

Learning Programming at Scale
From BLOG@CACM

Learning Programming at Scale

I summarize my first three years of research as an assistant professor on studying and building tools to support people who are learning computer programming.

Deep Dictionary
From BLOG@CACM

Deep Dictionary

The abstraction from big data on English words of distributed vector representations computing simple semantic aspects has drawn interest from the computing community...

Older Adults Learning Computer Programming: Motivations, Frustrations, and Design Opportunities
From BLOG@CACM

Older Adults Learning Computer Programming: Motivations, Frustrations, and Design Opportunities

I summarize the first known research study of older adults (aged 60 and over) learning computer programming.

Fact over Fiction
From BLOG@CACM

Fact over Fiction

Given a choice between the right to mass-disinform and democracy, I choose democracy.

Cybersecurity in the Trump Era
From BLOG@CACM

Cybersecurity in the Trump Era

Deterrence is simply the wrong way to think about cybersecurity.

Fact Versus Frivolity in Facebook
From BLOG@CACM

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.

What Happened?
From BLOG@CACM

What Happened?

As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.

Null-pointer Crashes, No More
From BLOG@CACM

Null-pointer Crashes, No More

Void safety is a guarantee that no code will ever catch a reference with its pants down.

Database Decay and What To Do About It
From BLOG@CACM

Database Decay and What To Do About It

In our opinion, database decay results from the multi-department organization of large implementations.

Stop Trying to Deter Cyberattacks
From BLOG@CACM

Stop Trying to Deter Cyberattacks

Whither cyber deterrence? In my view, let it wither.

Star Trek@50: Inspiring Discovery and Innovation
From BLOG@CACM

Star Trek@50: Inspiring Discovery and Innovation

Star Trek has inspired generations to pursue science and technology careers, not a few of whom have transformed part of it into technological and commercial fact...

Does Nature Use Data?
From BLOG@CACM

Does Nature Use Data?

Does nature use databases? Does nature use data structures?  

The Emerging Technology Landscape in China
From BLOG@CACM

The Emerging Technology Landscape in China

Observations about the emerging technology landscape in China, looking at mobile social networking, mobile payments, taxi hailing, and same or next day delivery...

And the 2016 ICPC Winner is….
From BLOG@CACM

And the 2016 ICPC Winner is….

The results are in for the 2016 ACM-ICPC World Finals

Welcome to the 40th Annual ACM-ICPC World Finals in Phuket, Thailand
From BLOG@CACM

Welcome to the 40th Annual ACM-ICPC World Finals in Phuket, Thailand

The ACM International Collegiate Programming Contest, sponsored by IBM, is the oldest, largest, and most prestigious programming competition in the world.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account