acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.

On the Ethics of Writing With AIs
From BLOG@CACM

On the Ethics of Writing With AIs

AI-generated text, even if accepted from an ethical standpoint, raises questions about the provenance of the generated text.

Why Are There So Many Programming Languages?
From BLOG@CACM

Why Are There So Many Programming Languages?

Most languages differ less in what they make possible, and more in terms of what they make easy. 

AI as (an Ersatz) Natural Science?
From BLOG@CACM

AI as (an Ersatz) Natural Science?

The emergence of large learned models is changing the nature of artificial intelligence research in fundamental ways.

Enterprise Metrics and Optimization
From BLOG@CACM

Enterprise Metrics and Optimization

Metrics are critical; without them, you are flying blind.  But be careful what you try to optimize, because you might just get it.

InnovateFPGA: Wrong Strategy Drives One of the Best FPGA Development Contests into Crisis
From BLOG@CACM

InnovateFPGA: Wrong Strategy Drives One of the Best FPGA Development Contests into Crisis

In my opinion, the main problem of the InnovateFPGA contest is the lack of a permanent team to lead.

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid
From BLOG@CACM

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid

Avoiding these common, easily preventable blunders will help you maximize success in your career journey.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account