acm - an acm publication
Commentaries
2008
  • Long Live the .250 Hitter
    The dearth of women in computing is very much on everyone's mind. Elena Strange offers a new perspective on this. She observes that the solid, utility hitters (and players) are the backbone of every baseball team. In playing on her computing teams she has no aspirations for MVP awards and strives for personal excellence in the things she does. She asks her male colleagues to value her as a .250 hitter without holding her to the standard of a .314 hitter. This simple change could open the gates to a flood of women in computing. Elena holds Grace Hopper as the equivalent of the legendary .314 hitter in computing. Hopper told her friends that she was never aspiring to be a legendary leader, but only to do the best possible job with the tasks that were before her. Be personally excellent and interact with people from your heart, said Hopper, and all the rest will take care of itself. You can see in Elena's story the seeds that Grace Hopper planted.
  • The Power of Dispositions
    Many people have been trying to come to grips with the new ways of learning that are supported by networked tools in recent years. These new ways feature distributed social ...
  • Mirrorware
    As we use and design computing systems, Michael Schrage asks us to reflect on what these systems reveal of ourselves and not just what they reveal to others. ...
  • Why Does Time Go Faster As We Get Older?
    Persons in every age group wonder why time seems to move so much faster than it did in their pasts. It seems as if there is never enough time to ...
  • The Three Acid Tests of Persuasive Writing
    If there are still scientists toiling away with little regard for what others may think of their efforts, it's time to drag them kicking and screaming into the 21st century. ...
  • My Problem with Design
    I was reminded today of the things I find troubling about our modern notions of design and designing. Hundreds of years ago, if one wanted to become a designer, one ...
  • Content-Based Image Retrieval System
    The term CBIR seems to have originated in 1992, when it was describe experiments into automatic retrieval of images from a database, based on the colors and shapes present. ...
  • Emergence of the Academic Computing Clouds
    Computational grids are very large-scale aggregates of communication and computation resources enabling new types of applications and bringing several benefits of economy-of-scale. The first computational grids were established in academic ...
  • Wot do U think? (What Do You Think?)
    (NOTE TO READERS: Out of sheer curiosity I used a website that allowed me to translate text from English to the language used by those who send and receive text ...
  • Technological Transformation of Human Experience
    This article was inspired by Don Ihde's work on the experience of technology in human-machine relations. (See Don Ihde. " The Experience of Technology," Cultural Hermeneutics, Vol. ...
  • Professor Andy Clark on Natural-born Cyborgs
    Bio of Dr. Clark: Dr. Andy Clark is a professor of philosophy and chair in logic and metaphysics at the University of Edinburgh in Scotland. Previously, he taught at Washington ...
  • Thoughts on the Nature of the Virtual
    This article seeks to formulate some brief sociological and philosophical thoughts on the radically problematic nature and character of the virtual. These ultimately aim to critically challenge and reinvent the ...
  • Information technology as an ethical challenge
    Information technology has an ambiguous impact on society. This situation calls for a two-level ethical analysis. On the one hand the issues of power and control must be reconsidered under ...
  • Mathematics by Jannat
    Arrgh!!! Well! If this is your reaction upon hearing the word MATH, you are not alone. ...
  • Scarce resources in computing
    How we organize computing - and innovate with it - is shaped by what at any time is the most scarce resource. In the early days of computing, processing (and, ...
  • Elliptic curve cryptography
    This paper describes the Elliptic Curve Cryptography algorithm and its suitability for smart cards. ...
  • Triple layer data security
    The growth of high speed computer networks and that of Internet, in particular, has hiked the ease of Data Communication. But in the other hand this growth is also responsible ...
  • Employee retention: By way of management control systems
    Loyalty is passé in the modern time and professionalism is the buzzword in the contemporary corporate world. The reasons of employee attrition are also changing. Now-a-days employee leaves an organization ...
  • On degree sequence
    I ndi got her BS in Computer Science from Cal Poly and began her master's at Colorado State. She then worked as a software engineer, later managing Web applications that ...
  • Knowledge mechanics and its temporal nature
    Wordnet defines knowledge as the psychological result of perception, learning and reasoning [1]. Like mechanics is the study of the way matter and force interact with each other, knowledge mechanics ...
  • A fuzzy modeling approach to evaluate faculty performance
    Performance of a teacher is vital both for students and institution and must be measured and evaluated for positive reinforcement to teaching. This paper presents a mathematical model to evaluate ...
  • Smart phones: A tutorial
    1. INTRODUCTION Pervasive Computing integrates computation in the environment rather than computers which are distinct objects. Other terms for pervasive computing ubiquitous computing, calm technology, things that think and everyware. ...
  • The rise and fall of a good programmer
    Of all the sayings I dislike, the most vapid is one I have heard as long as I have been working with IT: We will have the paperless toilet before ...
  • Anticipating and resolving resource overloads
    The Concept of a Project Resource In the context of project management, a resource is any entity that contributes to the accomplishment of project activities. Most project resources perform work ...
  • Avoiding disaster when your hard drive fails
    No one really expects a disk crash, but they do happen, usually at the most unconvenient times. Having a quick and easy-to-restore backup can eliminate both the distress and expense ...
  • Why visual aids need to be less visual
    I was recently invited to a presentation by an accomplished speaker. Needless to say, his speech was well structured, his manner relaxed and confident, his eye contact and body language ...
  • Use of genetic algorithms for Indian music mixing
    Music has changed and evolved through time and time tells that it has always been for the better. In our study, we have implemented Genetic Algorithms for the generation of ...
  • Hermeneutics facing the
    The origin of this paper goes back to the International Conference "Phenomenology and Technology" held at the Philosophy and Technology Studies Center, Polytechnic University (New York), October 2- 4, 1986 ...
  • ERP system replacement criteria
    An ERP system is our information backbone and reaches into all areas of our business and value-chain. Replacing it can open unlimited business opportunities. The cornerstone of this effort is ...
  • Whatever happened to cybernetics?
    Has the discipline of cybernetics been unable to recognize and respond to appropriate "midcourse corrections" and in the process had its destiny imposed by external "turning points"? ...
  • Understanding software testing concepts
    Software testing concepts have been briefly described in this article. Readers would find it easier to understand fundamental concepts of software testing by going through a concept map thereof. ...
  • End laptop serfdom
    Time to end personal technology serfdom! I hate company-specific technology standards, at least those that specify technology in terms other than file formats, access protocols and application programming interfaces. ...
  • About english: On the other hand
    I read Philip Yaffe's two recent Ubiquity pieces with interest, all the more so because I myself have plunged back into an international experience after sampling the delights of retirement ...
  • Is the GMO controversy relevant to computer ethics?
    Computing and information technology professionals have exhibited high standards of engagement with ethical issues relating to privacy, information security and abuse of the technical capabilities they have been responsible for ...