acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

The Life-or-Death Importance of Medical Device Security
From BLOG@CACM

The Life-or-Death Importance of Medical Device Security

Cybersecurity was not always top of mind when these devices were being created.

Face It, Self-Driving Cars Still Haven't Earned Their Stripes
From BLOG@CACM

Face It, Self-Driving Cars Still Haven't Earned Their Stripes

Edge cases remain a serious, unsolved problem, $100 billion later.

Duped No More: Navigating the Maze of Social Engineering Schemes
From BLOG@CACM

Duped No More: Navigating the Maze of Social Engineering Schemes

The best way to guard against becoming a target of social engineering is to familiarize yourself with the strategies, psychological hooks, and technological means...

Federated Learning: How Private Is It Really?
From BLOG@CACM

Federated Learning: How Private Is It Really?

Just when it looks like Federated Learning is able to keep local data private, out comes a study to deflate us.

Automated Tests Are the Safety Net
From BLOG@CACM

Automated Tests Are the Safety Net

Automated testing in software development significantly diminishes routine work and saves time, allowing programmers to work more effectively.

The Dissemination Game: Incentives of In-Person vs Virtual Participation
From BLOG@CACM

The Dissemination Game: Incentives of In-Person vs Virtual Participation

Incentives are changing the effectiveness of computer science conferences, but perhaps better conference design can improve them.

Egalitarian Authorship
From BLOG@CACM

Egalitarian Authorship

Is there a way to provide egalitarian authorship to papers?

Lessons from PL/I:  A Most Ambitious Programming Language
From BLOG@CACM

Lessons from PL/I: A Most Ambitious Programming Language

PL/I stands for Programming Language 1, and its aim was to be the Highlander of programming languages. 

VOT Challenge: Computer Vision Competition
From BLOG@CACM

VOT Challenge: Computer Vision Competition

VOT Challenge is one of the outstanding competitions in computer vision. At the end of this important event this year, I would like to share my opinions about this...

Exponential Protests
From BLOG@CACM

Exponential Protests

Exponential organizations offer an appropriate organized structure for the current Israeli protest, and maybe for other cases of civil resistance.

The Hadoop Ecosystem's Continued Impact
From BLOG@CACM

The Hadoop Ecosystem's Continued Impact

Hadoop owed much to the Google GFS, MapReduce, and BigTable papers, but it was also a response to a broader technology community need. 

Teaching Data Science Research Methods to Human Resources Practitioners – Part 4
From BLOG@CACM

Teaching Data Science Research Methods to Human Resources Practitioners – Part 4

We believe programming experience is crucial for human resources practitioners in the data and tech era.

Navigating the 2023 Cybersecurity Landscape
From BLOG@CACM

Navigating the 2023 Cybersecurity Landscape

The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.

A Turning Point for U.S. AI Policy: Senate Explores Solutions
From BLOG@CACM

A Turning Point for U.S. AI Policy: Senate Explores Solutions

Preparing for the proliferation of Artificial Intelligence.

ChatGPT Helps or Hurts our Cybersecurity?
From BLOG@CACM

ChatGPT Helps or Hurts our Cybersecurity?

The specter is that when fully mature, this technology would be able to generate undetectable attacks and the defenders will be constantly fighting these fires....

A Year Embedded in the Crypto-NFT Space
From BLOG@CACM

A Year Embedded in the Crypto-NFT Space

From digital ownership to artistic communities.

Teaching Data Science Research Methods to Human Resources Practitioners: Part Two
From BLOG@CACM

Teaching Data Science Research Methods to Human Resources Practitioners: Part Two

"When I heard we will be learning Python, I became anxious."

Cybersecurity Mistakes to Avoid at All Costs
From BLOG@CACM

Cybersecurity Mistakes to Avoid at All Costs

Preventing unauthorized access or misuse of confidential data.

Twiddler: Configurability for Me, but Not for Thee
From BLOG@CACM

Twiddler: Configurability for Me, but Not for Thee

Online platform businesses have a distinctly more abusive and sinister character than brick-and-mortar retail chains.

The Urgency of the Technological, Geopolitical, and Sustainability Races
From BLOG@CACM

The Urgency of the Technological, Geopolitical, and Sustainability Races

The HiPEAC Vision 2023.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account