acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

How Many Computers Will You Own?
From BLOG@CACM

How Many Computers Will You Own?

How many computing devices will you have in ten years? Two? Six? Just one?

Albion College Eliminates Computer Science
From BLOG@CACM

Albion College Eliminates Computer Science

Albion College decides to eliminate the computer science major due to budget cuts and low enrollment, because it's not really part of 21st century work.

The Complicated Issues of Computing Education in Qatar
From BLOG@CACM

The Complicated Issues of Computing Education in Qatar

The ACM Education Board visited Qatar at the beginning of May.  At Qatar University, 70% of the students in CS are women, and those we met are hungry to produce...

On FIFA World Cup 2010: Football and Internet in Latin America
From BLOG@CACM

On FIFA World Cup 2010: Football and Internet in Latin America

Quick view on how the FIFA Football World Cup will affect Internet in Latin America.

Choosing Successful Research
From BLOG@CACM

Choosing Successful Research

How to choose research projects that are more likely to be successful.

Malvertisements Growing as Online Security Threat
From BLOG@CACM

Malvertisements Growing as Online Security Threat

Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...

Successful Software Platforms Are the Byproducts of Successful Businesses
From BLOG@CACM

Successful Software Platforms Are the Byproducts of Successful Businesses

Startups need their current business to be successful and self-sustaining before they place serious effort in building a general software platform.

On Social Networks, Political Campaigns and Threats
From BLOG@CACM

On Social Networks, Political Campaigns and Threats

 Brief discussion on how social networks are now the battlefield of political campaigns, death threats and more.

What Security Advice Should We Give?
From BLOG@CACM

What Security Advice Should We Give?

Are people being rational when they ignore the security advice we give them?  If so, what advice should we give them that they would not ignore?

Personal Factories
From BLOG@CACM

Personal Factories

Since several years ago, with the beginning of nanoscience, the idea having of micro factories, like household microwave ovens, is floating in the air.

Consumerization of IT and Research
From BLOG@CACM

Consumerization of IT and Research

When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...

Turns out That Brain Training Games Don't Work
From BLOG@CACM

Turns out That Brain Training Games Don't Work

A brief article pointing to a new large scale study published in Nature about the effect of brain training games.

Robots After Roomba: The Ethics of Electronic Companions
From BLOG@CACM

Robots After Roomba: The Ethics of Electronic Companions

As robots become woven into the fabric of daily life, what ethical issues will the world face?

What Makes a Good HCI Systems Paper?
From BLOG@CACM

What Makes a Good HCI Systems Paper?

 Proposing a standard for reviewing HCI systems papers.

World of Warcraft-Playing Professors
From BLOG@CACM

World of Warcraft-Playing Professors

Are academics taking serious games too seriously?

Social Media and the Twitter Backchannel at CHI2010
From BLOG@CACM

Social Media and the Twitter Backchannel at CHI2010

A marked difference at CHI 2010 compared to last year is the amount of research around social media and the use of social media during the conference.  These practices...

CHI 2010: ­User Interfaces Learn a Thing or Two
From BLOG@CACM

CHI 2010: ­User Interfaces Learn a Thing or Two

The 2010 conference in Human Factors in Computing Systems has seen a noticeable uptick in projects on and engagement with machine learning.

CHI 2010 Opening Plenary: Thinking About Messy Futures
From BLOG@CACM

CHI 2010 Opening Plenary: Thinking About Messy Futures

"Messy Futures: Culture, Technology and Research" was the title of Genevieve Bell’s opening plenary speech at CHI 2010, and it gave attendees a plethora of facts...

Encouraging Girls to Study Geeky Subjects (part 2): Programmable Bracelets
From BLOG@CACM

Encouraging Girls to Study Geeky Subjects (part 2): Programmable Bracelets

Some thoughts about novel ways to attract girls to study computing: e-textiles and computational crafts.

Internet Information Freedom Revisited.
From BLOG@CACM

Internet Information Freedom Revisited.

Many countries have started to control access to information on Internet for their citizens, most famous case being China, but Latin America does not escape this...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account