acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

ChatGPT Helps or Hurts our Cybersecurity?
From BLOG@CACM

ChatGPT Helps or Hurts our Cybersecurity?

The specter is that when fully mature, this technology would be able to generate undetectable attacks and the defenders will be constantly fighting these fires....

Artificial Intelligence Without Real Intelligence?
From BLOG@CACM

Artificial Intelligence Without Real Intelligence?

Do the programs understand what they write?

Serendipity: When Research in One Area Leads to a Positive Result in Another
From BLOG@CACM

Serendipity: When Research in One Area Leads to a Positive Result in Another

A problem of the extremely optimal family of circulant graphs: when research in one scientific field gives an unexpected result in another.

The Need For Combined Data And Analytic Governance
From BLOG@CACM

The Need For Combined Data And Analytic Governance

Numbers don't mean anything if people don't understand, or trust, the computation behind them.

Inorganic Growth In Tech: Getting Shredded with Acquisitions
From BLOG@CACM

Inorganic Growth In Tech: Getting Shredded with Acquisitions

Acquisitions happen quite often in the tech industry and are far more complicated to pull off successfully than popping a pill.

On the Evolution of Languages: Natural, Mathematical, and Computational
From BLOG@CACM

On the Evolution of Languages: Natural, Mathematical, and Computational

Comparing the evolution of natural languages, which are used by people all over the world, with two artificial languages: the language of mathematics and programing...

AI's Jurassic Park Moment
From BLOG@CACM

AI's Jurassic Park Moment

New systems like chatGPT are enormously entertaining, and even mind-boggling, but also unreliable, and potentially dangerous.

Logical Beats Sequential
From BLOG@CACM

Logical Beats Sequential

Often, "we do this and then we do that" is just a lazy way of stating "to do that, we must have achieved this."

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

The Legacy of Barry Boehm
From BLOG@CACM

The Legacy of Barry Boehm

One of the founders of software engineering as we know it.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account