acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Matching Digital Photos to Identify Wildlife
From BLOG@CACM

Matching Digital Photos to Identify Wildlife

Dutch Scientists create digital "collective intelligence" system to compare photos of animals' markings. 

Low-Cost Sensors Help People Turn 'Green'
From BLOG@CACM

Low-Cost Sensors Help People Turn 'Green'

University of Washington and Carnegie Mellon researchers are building sensors for phones and homes that give people feedback on their habits and encourage them...

Framing the Right Problem For Water Fowl
From BLOG@CACM

Framing the Right Problem For Water Fowl

 U.S. Geological Survey scientists describe their work, outlining complexity.

HPC: Making a Small Fortune
From BLOG@CACM

HPC: Making a Small Fortune

There is an old joke in the high-performance computing community that begins with a question, “How do you make a small fortune in high-performance computing?” There...

Scientists Convene at First Computational Sustainability Meeting
From BLOG@CACM

Scientists Convene at First Computational Sustainability Meeting

 Keynote Address at the First Computational Sustainability Meeting by Carla Gomes.

Windmills in the Water
From BLOG@CACM

Windmills in the Water

A call to the computer science community for what a research agenda might look like for the role of information and communications technologies in energy, the environment...

E-Government in Latin America
From BLOG@CACM

E-Government in Latin America

According to wikipedia: e-Government  is a diffused neologism used to refer to the use of information and communication technology to provide and improve government...

The Impact of APCS on ­Undergraduate CS Enrollment
From BLOG@CACM

The Impact of APCS on ­Undergraduate CS Enrollment

The critics and detractors of the Advanced Placement exam in Computer Science (APCS) are many.  But the flaws of APCS most likely have no effect on undergraduate...

From BLOG@CACM

In February, President Obama pegged Melissa Hathaway of the National Security Council to do a 60-day review of the nation’s cybersecurity policy. Midway through...

Only the Developed World Lacks Women in Computing
From BLOG@CACM

Only the Developed World Lacks Women in Computing

The developing world has lots of women in computing. Great talks at this week's NCWIT meeting explain why the difference.

Security Education Can Really Work (but Only If It's Done Right)
From BLOG@CACM

Security Education Can Really Work (but Only If It's Done Right)

Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...

'There's an App For That,' and You Could Write It
From BLOG@CACM

'There's an App For That,' and You Could Write It

The challenge of computing education today is convincing students that not every application is done and available for download.

Common Problems of SE Students in Latin America, Part 1
From BLOG@CACM

Common Problems of SE Students in Latin America, Part 1

First part and introduction of an analysis to common problems faced by SE students in Latin America.

The Great Electronic Brain and the Rhetoric of Recruitment
From BLOG@CACM

The Great Electronic Brain and the Rhetoric of Recruitment

We rarely talk about computers as "Electronic Brains" or "Thinking Machines." That seems presumptuous or audacious today.  Maybe that's exactly what we need to...

Results of IT in Education
From BLOG@CACM

Results of IT in Education

Short review of the results of the implementation of information technologies in latin american education

What Is a Good Recommendation Algorithm?
From BLOG@CACM

What Is a Good Recommendation Algorithm?

Someone may win the one million dollar Netflix Prize soon.  Will the winning algorithm produce movie recommendations that people like?

Privacy As... Sharing More Information?
From BLOG@CACM

Privacy As... Sharing More Information?

When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...

Connecting the Two Ends: Mobile Clouds
From BLOG@CACM

Connecting the Two Ends: Mobile Clouds

  In 1959, the colorful and brilliant physicist, Richard Feynman, gave a seminal lecture to the American Physical Society entitled, "There's Plenty of Room at...

Canaima, Venezuela's Linux Distro Venezuela Ii
From BLOG@CACM

Canaima, Venezuela's Linux Distro Venezuela Ii

Second part of Venezuela open source experience, this time a short talk about Canaima, the linux debian distro for public entities .

DBMSs For Science Applications: A Possible Solution
From BLOG@CACM

DBMSs For Science Applications: A Possible Solution

Quite a few scientists who deal with the processing and storage of large amounts of data are unhappy with relational DBMSs. Here are several reasons why—and a possible...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account