acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Face It, Self-Driving Cars Still Haven't Earned Their Stripes
From BLOG@CACM

Face It, Self-Driving Cars Still Haven't Earned Their Stripes

Edge cases remain a serious, unsolved problem, $100 billion later.

Federated Learning: How Private Is It Really?
From BLOG@CACM

Federated Learning: How Private Is It Really?

Just when it looks like Federated Learning is able to keep local data private, out comes a study to deflate us.

Automated Tests Are the Safety Net
From BLOG@CACM

Automated Tests Are the Safety Net

Automated testing in software development significantly diminishes routine work and saves time, allowing programmers to work more effectively.

Coaxing Performance from the Complexity of HPC
From BLOG@CACM

Coaxing Performance from the Complexity of HPC

Network latency and HPC performance.

The Dissemination Game: Incentives of In-Person vs Virtual Participation
From BLOG@CACM

The Dissemination Game: Incentives of In-Person vs Virtual Participation

Incentives are changing the effectiveness of computer science conferences, but perhaps better conference design can improve them.

Egalitarian Authorship
From BLOG@CACM

Egalitarian Authorship

Is there a way to provide egalitarian authorship to papers?

Lessons from PL/I:  A Most Ambitious Programming Language
From BLOG@CACM

Lessons from PL/I: A Most Ambitious Programming Language

PL/I stands for Programming Language 1, and its aim was to be the Highlander of programming languages. 

VOT Challenge: Computer Vision Competition
From BLOG@CACM

VOT Challenge: Computer Vision Competition

VOT Challenge is one of the outstanding competitions in computer vision. At the end of this important event this year, I would like to share my opinions about this...

The Hadoop Ecosystem's Continued Impact
From BLOG@CACM

The Hadoop Ecosystem's Continued Impact

Hadoop owed much to the Google GFS, MapReduce, and BigTable papers, but it was also a response to a broader technology community need. 

Beyond Passwords: The Path to Stronger Authentication Mechanisms
From BLOG@CACM

Beyond Passwords: The Path to Stronger Authentication Mechanisms

The inherent risks associated with passwords stem from their very nature.

ChatGPT Helps or Hurts our Cybersecurity?
From BLOG@CACM

ChatGPT Helps or Hurts our Cybersecurity?

The specter is that when fully mature, this technology would be able to generate undetectable attacks and the defenders will be constantly fighting these fires....

A Year Embedded in the Crypto-NFT Space
From BLOG@CACM

A Year Embedded in the Crypto-NFT Space

From digital ownership to artistic communities.

The Imperativity of Algorithms
From BLOG@CACM

The Imperativity of Algorithms

The important named algorithms that we call upon deserve a robust ontology.

Artificial Intelligence Without Real Intelligence?
From BLOG@CACM

Artificial Intelligence Without Real Intelligence?

Do the programs understand what they write?

Enabling AI Projects In An Enterprise
From BLOG@CACM

Enabling AI Projects In An Enterprise

Identifying the development behaviors that have the highest chance of success for artificial intelligence efforts.

Why *is* Bing So Reckless?
From BLOG@CACM

Why *is* Bing So Reckless?

And how did some prominent journalists utterly miss this initially?

Using GitHub CoPilot is Like Having a Superpower
From BLOG@CACM

Using GitHub CoPilot is Like Having a Superpower

With the advent of Large Language Models (LLMs) and tools like GitHub CoPilot, I think we’re a step closer towards a world where software can be created by anyone...

What Google Should Really Be Worried About
From BLOG@CACM

What Google Should Really Be Worried About

How sewers of lies could spell the end of Web search.

Inside the Heart of ChatGPT's Darkness
From BLOG@CACM

Inside the Heart of ChatGPT's Darkness

A Nightmare on LLM Street.

The Need For Combined Data And Analytic Governance
From BLOG@CACM

The Need For Combined Data And Analytic Governance

Numbers don't mean anything if people don't understand, or trust, the computation behind them.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account