acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Backdoor is a Victory for Terrorists
From Blog@Ubiquity

The Backdoor is a Victory for Terrorists

When authorities realized the Paris terrorists used strong encryption to send messages to one another they went off the encryption deep end. Now, many nations are...

How Much Higher Can ICT Rise? On the Final Limits of ICT
From Blog@Ubiquity

How Much Higher Can ICT Rise? On the Final Limits of ICT

Information and communication technology (ICT) is the most distinctive cultural accomplishment of the last half century. It is unprecedented in sophistication and...

Graduating Bits Announcement
From My Biased Coin

Graduating Bits Announcement

Boaz asked me to remind people about ITCS, and in particular the Graduating Bits Event.  Just in time for those of us reading application folders....ITCS 2016 will...

Language Lessons from a Steam-powered Light Bulb
From Blog@Ubiquity

Language Lessons from a Steam-powered Light Bulb

People who make a career in science, computers or otherwise, generally do so because they are naturally drawn to it. They find science fascinating and entertaining...

My GPS Car Is Smarter Than Your Honor Student
From Blog@Ubiquity

My GPS Car Is Smarter Than Your Honor Student

Driverless cars may know how to negotiate intersections and park themselves better than humans, but so far I haven’t read about a smart car that can get me through...

Sirens’ Song of the IoT
From Blog@Ubiquity

Sirens’ Song of the IoT

These days we are witnessing a gold rush to the shining, promising new trillions of dollars market consisting of 30-50 billion devices interconnecting anything....

Who Shaped Modern Computing — Part 2?
From Blog@Ubiquity

Who Shaped Modern Computing — Part 2?

Legends like John McCarthy, Edsger Dijkstra and John Backus made significant impacts in the field and shaped modern computing as we know it today. By developing...

Who is Big in Computing – Part 1?
From Blog@Ubiquity

Who is Big in Computing – Part 1?

We should never forget the roots of our profession, and humble programmers should remember who made modern computing. The post Who is Big in Computing – Part 1?...

Imitators and Innovators Adopt RISC
From Blog@Ubiquity

Imitators and Innovators Adopt RISC

While it may come as a surprise, today RISC architecture computer systems dominate the mobile computing landscape. It has been 40 years in the making. The post ...

Yes, We Have Postdocs This Year
From My Biased Coin

Yes, We Have Postdocs This Year

The Harvard Theory of Computation group has postdocs.  This year, besides our usual general call for postdocs, we are also inaugurating the Michael O. Rabin Postdoctoral...

What Can Paragons of Literature Teach Us about Writing Better Computer Programs?
From Blog@Ubiquity

What Can Paragons of Literature Teach Us about Writing Better Computer Programs?

While grappling with mechanics of writing, we all too often lose sight of another important insight into effective communication. The post What Can Paragons ofBLOG...

Yes, We're Hiring This Year
From My Biased Coin

Yes, We're Hiring This Year

Harvard's CS search ad is apparently up and out.  We're eagerly awaiting applications....https://academicpositions.harvard.edu/postings/6497The Harvard John A.http...

Are Google and Apple About to Pivot?
From Blog@Ubiquity

Are Google and Apple About to Pivot?

The ability to pivot is a sign of agility. As technology continue to rapidly advance, how close are Google and Apple to pivoting? The post Are Google and AppleBLOG...

This Year's Andreessen-Horowitz Meeting
From My Biased Coin

This Year's Andreessen-Horowitz Meeting

Andreessen Horowitz had another Academic Roundtable, which I've written about in previous years (here, here).  For me, the most exciting session was on VirtualMatthew...

Will the Flying Car Make a Comeback?
From Blog@Ubiquity

Will the Flying Car Make a Comeback?

We're still waiting for flying cars to materialize as a mass-market product. Why? The answer lies in computer technology—or the lack thereof. The post Will theBLOG...

One Lecture Down....
From My Biased Coin

One Lecture Down....

CS125, the "new", "honors-ish" Algorithms and Complexity course, got off to a good start today.  The room was full with not enough seats for people, the students...

Can Robots Be Trusted?
From Blog@Ubiquity

Can Robots Be Trusted?

Can robots be trusted to make better decisions than humans? Sometimes automation can be a matter or life or death. The post Can Robots Be Trusted? appeared first...

CACM Viewpoints on Theory and Experiments
From My Biased Coin

CACM Viewpoints on Theory and Experiments

There's a fun pair of viewpoints in the September CACM by Jeffrey Ullman and myself on experiments in computer science research, with him addressing systems conferences...

Why Physical Cyber Security is Broken
From Blog@Ubiquity

Why Physical Cyber Security is Broken

The physical Internet is evolving away from resiliency toward fragility and vulnerability. A broken Internet means flawed cybersecurity. The post Why Physical Cyber...

SIGACT Meeting, Some Stuff
From My Biased Coin

SIGACT Meeting, Some Stuff

As some of you know, I was recently elected to the position of SIGACT (ACM Special Interest Group on Algorithms and Computation Theory) Chair.  So some part ofpreview...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account