acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Biases in Author Recognition
From BLOG@CACM

Biases in Author Recognition

When reading papers, we make simplifications and have assumptions about author roles and relative contributions.

How Scripting Misses the Mark
From BLOG@CACM

How Scripting Misses the Mark

Scripting languages promise easy automation but prove difficult to learn. Let's stop focusing on simplified syntax and instead focus on understandability and learnability...

Students Speak to Ethical Issues
From BLOG@CACM

Students Speak to Ethical Issues

What are the concerns of students after study of computer ethics?

Anti-Sanctions: New Operating System for Mobile Devices
From BLOG@CACM

Anti-Sanctions: New Operating System for Mobile Devices

There comes a time not only of crisis, but also of great opportunities. And here, it is important to take advantage of these new opportunities.

Data Anonymization Using the Random Sum Method
From BLOG@CACM

Data Anonymization Using the Random Sum Method

The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.

Blockchain For What, Exactly?
From BLOG@CACM

Blockchain For What, Exactly?

Considering the real-world consequences of blockchain hype.

R&D or r&d: What's the Difference?
From BLOG@CACM

R&D or r&d: What's the Difference?

Research produces generalized knowledge; Development produces generalized functionality. Not all efforts that use research skills or that use development skills...

Cryptocurs Don't Asportate
From BLOG@CACM

Cryptocurs Don't Asportate

Cryptocurrency on a blockchain cannot be stolen -- it's true.

Log4j and the Thankless High-Risk Task of Managing Software Component Upgrades
From BLOG@CACM

Log4j and the Thankless High-Risk Task of Managing Software Component Upgrades

Managing included versions of third-party software components too often puts developers in no-win situations.

Cultivating Habits: -1 +2 for Researchers
From BLOG@CACM

Cultivating Habits: -1 +2 for Researchers

The New Year is stereotypically the time when we resolve to start some good habits and get rid of some of the bad.

Experiencing Loops in Time
From BLOG@CACM

Experiencing Loops in Time

We don't experience program loops as blocks, started over, because time is one-way.

Publishing, The Choice and The Luck
From BLOG@CACM

Publishing, The Choice and The Luck

Selecting publishing targets is a process with no simple solutions.

How to Reduce the Carbon Emissions of Your Website
From BLOG@CACM

How to Reduce the Carbon Emissions of Your Website

We can control our online ecological impact.

Tech Meetups In A Pandemic
From BLOG@CACM

Tech Meetups In A Pandemic

By 2019, I generally thought there wasn't much that could surprise me about organizing meetups. Then Covid-19 hit. I was so wrong.

Protecting Enterprise Use of IoT
From BLOG@CACM

Protecting Enterprise Use of IoT

How to strengthen the security of the Internet of Things in organizations.

How Does One Multiply with Napier's Rods?
From BLOG@CACM

How Does One Multiply with Napier's Rods?

Napier's multiplication and division rods, deriving from the basic multiplication table, simplify calculations considerably.

Software Learning: The Art Of Design Regret
From BLOG@CACM

Software Learning: The Art Of Design Regret

How should software engineers try to classify their reflections?

How Does One Calculate With A Circular Slide Rule?
From BLOG@CACM

How Does One Calculate With A Circular Slide Rule?

The circular slide rule was widely used until the 1970s.

10 Tips for Implementing Executable Exams
From BLOG@CACM

10 Tips for Implementing Executable Exams

The focus is on executable exams for an Introduction to Computer Science course.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account