acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Can Transaction Costs Explain Scale-Free Networks Born by Preferential Attachment?
From BLOG@CACM

Can Transaction Costs Explain Scale-Free Networks Born by Preferential Attachment?

Centralization leads to more efficient communication and control, which leads to lower transaction costs, which increases the useful work each node can spend on...

AI's Jurassic Park Moment
From BLOG@CACM

AI's Jurassic Park Moment

New systems like chatGPT are enormously entertaining, and even mind-boggling, but also unreliable, and potentially dangerous.

Will Free Open Access Publication Become a Mass Phenomenon?
From BLOG@CACM

Will Free Open Access Publication Become a Mass Phenomenon?

In this blog post, I would like to go over the value of different publication platforms from the point of view of an ordinary scientific researcher.

Logical Beats Sequential
From BLOG@CACM

Logical Beats Sequential

Often, "we do this and then we do that" is just a lazy way of stating "to do that, we must have achieved this."

Turing, Churchill, and the Colossus
From BLOG@CACM

Turing, Churchill, and the Colossus

Did Turing collaborate on the Colossus?

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?
From BLOG@CACM

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?

Hint: It's not all about scaling.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

Which Were the Most Influential Early Computers?
From BLOG@CACM

Which Were the Most Influential Early Computers?

Considering early machines that had the greatest influence on the development of program-controlled computers.

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.

Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education
From BLOG@CACM

Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education

How can machine learning educators help learners cope with the base rate neglect cognitive bias?

On the Ethics of Writing With AIs
From BLOG@CACM

On the Ethics of Writing With AIs

AI-generated text, even if accepted from an ethical standpoint, raises questions about the provenance of the generated text.

AI as (an Ersatz) Natural Science?
From BLOG@CACM

AI as (an Ersatz) Natural Science?

The emergence of large learned models is changing the nature of artificial intelligence research in fundamental ways.

Enterprise Metrics and Optimization
From BLOG@CACM

Enterprise Metrics and Optimization

Metrics are critical; without them, you are flying blind.  But be careful what you try to optimize, because you might just get it.

InnovateFPGA: Wrong Strategy Drives One of the Best FPGA Development Contests into Crisis
From BLOG@CACM

InnovateFPGA: Wrong Strategy Drives One of the Best FPGA Development Contests into Crisis

In my opinion, the main problem of the InnovateFPGA contest is the lack of a permanent team to lead.

Whence Machine Volition?
From BLOG@CACM

Whence Machine Volition?

How could a computer develop or even express volition?

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid
From BLOG@CACM

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid

Avoiding these common, easily preventable blunders will help you maximize success in your career journey.

Biases in Author Recognition
From BLOG@CACM

Biases in Author Recognition

When reading papers, we make simplifications and have assumptions about author roles and relative contributions.

How Scripting Misses the Mark
From BLOG@CACM

How Scripting Misses the Mark

Scripting languages promise easy automation but prove difficult to learn. Let's stop focusing on simplified syntax and instead focus on understandability and learnability...

Students Speak to Ethical Issues
From BLOG@CACM

Students Speak to Ethical Issues

What are the concerns of students after study of computer ethics?

Anti-Sanctions: New Operating System for Mobile Devices
From BLOG@CACM

Anti-Sanctions: New Operating System for Mobile Devices

There comes a time not only of crisis, but also of great opportunities. And here, it is important to take advantage of these new opportunities.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account