Sign In

Communications of the ACM

BLOG@CACM



Cybersecurity in the Trump Era
From BLOG@CACM

Cybersecurity in the Trump Era

Deterrence is simply the wrong way to think about cybersecurity.

Ethical Theories Spotted in Silicon Valley
From BLOG@CACM

Ethical Theories Spotted in Silicon Valley

Some of the prevailing theories of ethics surface in modern high tech.  We take a quick and rather superficial look at their tracks on the ground, noting especially...

Just Press Reboot
From BLOG@CACM

Just Press Reboot

Why does the press continue to talk about "computer problems"?

Fact Versus Frivolity in Facebook
From BLOG@CACM

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users. ...

ACM's Open-Conference Principle and Political Reality
From BLOG@CACM

ACM's Open-Conference Principle and Political Reality

The Open-Conference Principle is aimed at benefiting society.

The Work and Inspiration of the Commission on the History and Philosophy of Computing
From BLOG@CACM

The Work and Inspiration of the Commission on the History and Philosophy of Computing

The international organization HaPoC promotes and sponsors research that brings together the history and the philosophy of computing.

'Figure It Out' Isn't Enough: Striking a New Balance Between Understanding, Problem-Solving, and Design in Introductory CS Classes
From BLOG@CACM

'Figure It Out' Isn't Enough: Striking a New Balance Between Understanding, Problem-Solving, and Design in Introductory CS Classes

Intro CS courses should help students understand programs more and problem-solve less. 

Fiction as Model Theory
From BLOG@CACM

Fiction as Model Theory

Like model theory, fiction deploys a theory and an interpretation.  An interpretation that makes the statements of the theory true demonstrates consistency, in...

The Real Lesson of the Alleged Russian Hack
From BLOG@CACM

The Real Lesson of the Alleged Russian Hack

Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...

What Happened?
From BLOG@CACM

What Happened?

As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.

Null-pointer Crashes, No More
From BLOG@CACM

Null-pointer Crashes, No More

Void safety is a guarantee that no code will ever catch a reference with its pants down.

The Work and Inspiration of the APA Newsletter on Philosophy and Computers
From BLOG@CACM

The Work and Inspiration of the APA Newsletter on Philosophy and Computers

 The Newsletter of the Committee on Computing and Philosophy of the American Philosophical Association offers a wide range of scholarly work in the philosophy of...

Taking Incremental Steps Towards CS for All
From BLOG@CACM

Taking Incremental Steps Towards CS for All

U.S. states are developing novel, incremental approaches to CS for All.

Is Academia Guilty of Intellectual Colonization of Practice?
From BLOG@CACM

Is Academia Guilty of Intellectual Colonization of Practice?

Researchers should not treat practitioners as mere objects of their studies or simple sources of data, but work towards creating research partnerships with practitioners...

Database Decay and What To Do About It
From BLOG@CACM

Database Decay and What To Do About It

In our opinion, database decay results from the multi-department organization of large implementations.

Tech Industry Ph.D.s: Academia Can Be Nicer Than You Think
From BLOG@CACM

Tech Industry Ph.D.s: Academia Can Be Nicer Than You Think

If more Ph.D.s do not return to the academy, there will not be enough graduates capable of taking all those high tech jobs.

Please Explain
From BLOG@CACM

Please Explain

H-index in Web of Science?

Designing the Activities for a 'Computing Lab' to Support Computational Literacy
From BLOG@CACM

Designing the Activities for a 'Computing Lab' to Support Computational Literacy

Developing the teaching techniques so everyone develops computational literacy skills.

How We Teach Should Be Independent Of Who We Are Teaching
From BLOG@CACM

How We Teach Should Be Independent Of Who We Are Teaching

A look at teaching and diversity in Computer Science.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo