acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Data Anonymization Using the Random Sum Method
From BLOG@CACM

Data Anonymization Using the Random Sum Method

The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.

Blockchain For What, Exactly?
From BLOG@CACM

Blockchain For What, Exactly?

Considering the real-world consequences of blockchain hype.

R&D or r&d: What's the Difference?
From BLOG@CACM

R&D or r&d: What's the Difference?

Research produces generalized knowledge; Development produces generalized functionality. Not all efforts that use research skills or that use development skills...

Cryptocurs Don't Asportate
From BLOG@CACM

Cryptocurs Don't Asportate

Cryptocurrency on a blockchain cannot be stolen -- it's true.

Log4j and the Thankless High-Risk Task of Managing Software Component Upgrades
From BLOG@CACM

Log4j and the Thankless High-Risk Task of Managing Software Component Upgrades

Managing included versions of third-party software components too often puts developers in no-win situations.

Cultivating Habits: -1 +2 for Researchers
From BLOG@CACM

Cultivating Habits: -1 +2 for Researchers

The New Year is stereotypically the time when we resolve to start some good habits and get rid of some of the bad.

Experiencing Loops in Time
From BLOG@CACM

Experiencing Loops in Time

We don't experience program loops as blocks, started over, because time is one-way.

Publishing, The Choice and The Luck
From BLOG@CACM

Publishing, The Choice and The Luck

Selecting publishing targets is a process with no simple solutions.

How to Reduce the Carbon Emissions of Your Website
From BLOG@CACM

How to Reduce the Carbon Emissions of Your Website

We can control our online ecological impact.

Tech Meetups In A Pandemic
From BLOG@CACM

Tech Meetups In A Pandemic

By 2019, I generally thought there wasn't much that could surprise me about organizing meetups. Then Covid-19 hit. I was so wrong.

Protecting Enterprise Use of IoT
From BLOG@CACM

Protecting Enterprise Use of IoT

How to strengthen the security of the Internet of Things in organizations.

How Does One Multiply with Napier's Rods?
From BLOG@CACM

How Does One Multiply with Napier's Rods?

Napier's multiplication and division rods, deriving from the basic multiplication table, simplify calculations considerably.

Software Learning: The Art Of Design Regret
From BLOG@CACM

Software Learning: The Art Of Design Regret

How should software engineers try to classify their reflections?

How Does One Calculate With A Circular Slide Rule?
From BLOG@CACM

How Does One Calculate With A Circular Slide Rule?

The circular slide rule was widely used until the 1970s.

10 Tips for Implementing Executable Exams
From BLOG@CACM

10 Tips for Implementing Executable Exams

The focus is on executable exams for an Introduction to Computer Science course.

Is Computing a Team Sport?
From BLOG@CACM

Is Computing a Team Sport?

I take a peek at the history of computing to see if pioneering early developments were the results of team effort.

Understanding NoSQL Database Types: Document
From BLOG@CACM

Understanding NoSQL Database Types: Document

Document databases are particularly useful in app development.

Science-Changing Code
From BLOG@CACM

Science-Changing Code

The case of NumPy.

Charles Babbage and the Loom
From BLOG@CACM

Charles Babbage and the Loom

Babbage wanted to control his analytical engine, regarded as the ancestor of the modern-day computer, with punched cards.

Understanding NoSQL Database Types: Graph Databases
From BLOG@CACM

Understanding NoSQL Database Types: Graph Databases

SQL represents data stored in rows and tables, while high-growth NoSQL is data stores arranged via nested documents as columnar schemas or key-value pairs. One...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account