acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Is Computing Innovation Getting Harder?
From BLOG@CACM

Is Computing Innovation Getting Harder?

Many of us, inside the ivory tower and outside, have felt at times that research is not quite delivering at the rate we hope it would.

Is ChatGPT Really a 'Code Red' for Google Search?
From BLOG@CACM

Is ChatGPT Really a 'Code Red' for Google Search?

Maybe not.

Inorganic Growth In Tech: Getting Shredded with Acquisitions
From BLOG@CACM

Inorganic Growth In Tech: Getting Shredded with Acquisitions

Acquisitions happen quite often in the tech industry and are far more complicated to pull off successfully than popping a pill.

5 Best Practices for Cloud-Based Backup and Recovery in 2023
From BLOG@CACM

5 Best Practices for Cloud-Based Backup and Recovery in 2023

These practices help technical professionals ensure their organizations' data is protected and can be recovered quickly.

Observation of Bias
From BLOG@CACM

Observation of Bias

It may not be that obvious, but it's observable.

The Key to Successful Threat Intelligence
From BLOG@CACM

The Key to Successful Threat Intelligence

A modern Information Security perspective.

How to Teach
From BLOG@CACM

How to Teach

Make technology boon, not bane.

Did Grace Hopper Create the First Compiler?
From BLOG@CACM

Did Grace Hopper Create the First Compiler?

Heinz Rutishauser (ETH Zurich, Switzerland) is regarded as the developer of automatic programming.

How do Authors' Perceptions about their Papers Compare with Co-Authors' Perceptions and Peer-Review Decisions?
From BLOG@CACM

How do Authors' Perceptions about their Papers Compare with Co-Authors' Perceptions and Peer-Review Decisions?

Does peer review change authors' perception of their own papers?

Early Computers in Continental Europe
From BLOG@CACM

Early Computers in Continental Europe

About the Bark (binär automatisk relä-kalkylator, binary automatic relay computer) and Besk (binär elektronisk sekvens kalkylator, binary electronic sequential...

Will Free Open Access Publication Become a Mass Phenomenon?
From BLOG@CACM

Will Free Open Access Publication Become a Mass Phenomenon?

In this blog post, I would like to go over the value of different publication platforms from the point of view of an ordinary scientific researcher.

Bad Reasons to Reject Good Papers, and Vice Versa
From BLOG@CACM

Bad Reasons to Reject Good Papers, and Vice Versa

(or, am I Reviewer #2? Should I be?)

Logical Beats Sequential
From BLOG@CACM

Logical Beats Sequential

Often, "we do this and then we do that" is just a lazy way of stating "to do that, we must have achieved this."

Why Is It Hard to Define Data Science?
From BLOG@CACM

Why Is It Hard to Define Data Science?

Data science can be described as a science, as a research paradigm, as a research method, as a discipline, as a workflow, and as a profession.

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?
From BLOG@CACM

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?

Hint: It's not all about scaling.

Data Backup and VM Modernization: How-to Guide
From BLOG@CACM

Data Backup and VM Modernization: How-to Guide

A guide to VM modernization when dealing with data backups.

Stack Ranking: Organizational Cancer
From BLOG@CACM

Stack Ranking: Organizational Cancer

If only the best are hired, why isn't everybody great?

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain
From BLOG@CACM

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain

We analyze the operations of the Starlink Global Satellite System deployed by SpaceX, in terms of its security and resilience.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

Three Risks Facing Higher Education
From BLOG@CACM

Three Risks Facing Higher Education

The implications of COVID-19 for risk management in higher education.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account