acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Anti-Racist Computing Education: No More Excuses
From BLOG@CACM

Anti-Racist Computing Education: No More Excuses

On this #MLKDay, a list of resources to help center racial equity and justice in CS classrooms and a reminder that the CS Education community must make good on...

Finding a Path to CS for All: How Many U.S. High School Students Have Taken CS?
From BLOG@CACM

Finding a Path to CS for All: How Many U.S. High School Students Have Taken CS?

How do we measure progress towards CS for All?

Framing the Description of the Shrinking Pipeline
From BLOG@CACM

Framing the Description of the Shrinking Pipeline

The shrinking pipeline refers to the low percentages of women earning computer science academic degrees and holding faculty positions.

Original Roman Pocket Calculators are Extremely Rare
From BLOG@CACM

Original Roman Pocket Calculators are Extremely Rare

As far as we know, only three or four original specimens of the Roman hand abacus have survived.

Computational Thinking: The Discussion Continues
From BLOG@CACM

Computational Thinking: The Discussion Continues

Perspectives on computational thinking.

AI Education for Teens: Lifting the Hood on Data and Machine Learning
From BLOG@CACM

AI Education for Teens: Lifting the Hood on Data and Machine Learning

What are key ideas and intuitions foundational to AI that AI education in secondary schools should target? This blog post describes our approach to teaching AI...

Publishing, The Choice and The Luck
From BLOG@CACM

Publishing, The Choice and The Luck

Selecting publishing targets is a process with no simple solutions.

How to Reduce the Carbon Emissions of Your Website
From BLOG@CACM

How to Reduce the Carbon Emissions of Your Website

We can control our online ecological impact.

Safe AI in Education Needs You
From BLOG@CACM

Safe AI in Education Needs You

Artificial intelligence is coming to your learners and will raise challenging issues that need experts like you. Learn how you can get involved in AI and Educational...

What Should be Done About Facebook?
From BLOG@CACM

What Should be Done About Facebook?

The recent release of the Facebook papers by a whistleblower has confirmed that leaders at the company have long known about problems facilitated by their social...

Patent Protection in Europe
From BLOG@CACM

Patent Protection in Europe

Up to the second half of the 19th century —with the exception of the industrial power Great Britain—the protection of inventions was inadequate and strongly disputed...

Reinforcing Computer Science Education
From BLOG@CACM

Reinforcing Computer Science Education

What do computer science students need to know to be successful in industry?

Not Worth a Thousand Words
From BLOG@CACM

Not Worth a Thousand Words

Pictures are no substitute for substance.

Language Imitation Games and the Arrival of Broad and Shallow AI
From BLOG@CACM

Language Imitation Games and the Arrival of Broad and Shallow AI

On the impact of large language models.

Computers Were Originally Humans
From BLOG@CACM

Computers Were Originally Humans

Until the middle of the 20th century, computers were in fact humans who performed calculations.

Students are Interested in People, and Teachers Value Multiple Languages: ICER 2021 Pointers
From BLOG@CACM

Students are Interested in People, and Teachers Value Multiple Languages: ICER 2021 Pointers

A couple of excellent papers from the International Computing Education Research conference.

Safe Space for Alt-Views
From BLOG@CACM

Safe Space for Alt-Views

Not everyone who questions computational hegemony is appealing to magic, mysticism, or divinity.

We Are Camille
From BLOG@CACM

We Are Camille

Who is Camille Noûs, who has contributed to hundreds of papers on Google Scholar?

Tech Meetups In A Pandemic
From BLOG@CACM

Tech Meetups In A Pandemic

By 2019, I generally thought there wasn't much that could surprise me about organizing meetups. Then Covid-19 hit. I was so wrong.

Protecting Enterprise Use of IoT
From BLOG@CACM

Protecting Enterprise Use of IoT

How to strengthen the security of the Internet of Things in organizations.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account