acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

COLT/ICML Open Problems and ICML Instructions
From BLOG@CACM

COLT/ICML Open Problems and ICML Instructions

Open problems will be presented in a joint session in the evening of the COLT/ICML overlap day. If you have a difficult, theoretically definable problem in machine...

Research Data Sustainability and Access
From BLOG@CACM

Research Data Sustainability and Access

The dramatic growth of research data, the collaborative nature of international research, expectations for economic returns, and disciplinary differences all make...

From BLOG@CACM

John McCarthy

The contributions and personality of John McCarthy, one of the pioneers of computer science.

What We Owe Google, and What Google Owes ­Us
From BLOG@CACM

What We Owe Google, and What Google Owes ­Us

We rely on online information sources—maybe too much. What is our responsibility to make sure that they're accurate, and what responsibility do the sources have...

Research Directions For Machine Learning and Algorithms
From BLOG@CACM

Research Directions For Machine Learning and Algorithms

An in-depth discussion of near-term research directions for machine learning and algorithms.

Information Privacy: Changing Norms and Expectations
From BLOG@CACM

Information Privacy: Changing Norms and Expectations

That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...

Embracing Noise or Why Computer Scientists Should Stop Worrying and Learn to Love the Errors
From BLOG@CACM

Embracing Noise or Why Computer Scientists Should Stop Worrying and Learn to Love the Errors

Precision is not required in everything or even most things.  Failures are best handled by expecting them all the time, not treating them as exceptions.  We should...

Explaining Science and Engineering
From BLOG@CACM

Explaining Science and Engineering

As I have followed the international news regarding the Japanese disaster, I have been struck by the challenges each news organization has faced in explaining technical...

Intellectual Amplification via Computing
From BLOG@CACM

Intellectual Amplification via Computing

As the recent performance of IBM's Watson system on the game show Jeopardy! illustrated, the combination of large-scale data, rich algorithm suites and powerful...

Works in Progress: MIA
From BLOG@CACM

Works in Progress: MIA

It is time we extracted a sample of cultural DNA from computing's history and engineered a new generation of contemplative, informal workshops. After gestation,...

To Videolecture or Not
From BLOG@CACM

To Videolecture or Not

Should conferences cover the cost of a videolecture or not?  I say "yes."

HPC and the Excluded Middle
From BLOG@CACM

HPC and the Excluded Middle

Betwixt and between ubiquitous consumer software and the ethereal realm of ultra-high-performance computing, lies the excluded middle, the world of day-to-day computational...

How Should Peer Review Evolve?
From BLOG@CACM

How Should Peer Review Evolve?

A simmering debate on peer review processes threatens to boil to the surface of various discussion forums for the scientific communities and the public at large...

Technology Transfer: A Contact Sport
From BLOG@CACM

Technology Transfer: A Contact Sport

The success or failure of technology transfer depends on many factors. No single mechanism is guaranteed to succeed, though there are many mechanisms that are likely...

Mind Meld in Group Decision Making
From BLOG@CACM

Mind Meld in Group Decision Making

Social computing remains a hot research topic, and basic research on understanding group decision making and conditions under which crowdsourcing can lead to advantages...

In Vivo, In Vitro, In Silico
From BLOG@CACM

In Vivo, In Vitro, In Silico

These “grand challenges” of systems biology encompass almost every aspect of modern computing, from numerical and symbolic methods through data management and analytics...

Web Applications Crave Memory
From BLOG@CACM

Web Applications Crave Memory

Big web applications are hungry for RAM.  They want lots of low power RAM.  And they want little else.

Consumerization of IT and Research
From BLOG@CACM

Consumerization of IT and Research

When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...

Social Media and the Twitter Backchannel at CHI2010
From BLOG@CACM

Social Media and the Twitter Backchannel at CHI2010

A marked difference at CHI 2010 compared to last year is the amount of research around social media and the use of social media during the conference.  These practices...

Time to Rethink Computer Science Education: The (Social) Web Changes Everything!
From BLOG@CACM

Time to Rethink Computer Science Education: The (Social) Web Changes Everything!

Let's rethink computer science education in face of Web 1.0, Web 2.0, and beyond. The Internet have changed everything we know about how computing is done.  It's...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account