acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?
From BLOG@CACM

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?

Hint: It's not all about scaling.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

Which Were the Most Influential Early Computers?
From BLOG@CACM

Which Were the Most Influential Early Computers?

Considering early machines that had the greatest influence on the development of program-controlled computers.

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.

Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education
From BLOG@CACM

Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education

How can machine learning educators help learners cope with the base rate neglect cognitive bias?

On the Ethics of Writing With AIs
From BLOG@CACM

On the Ethics of Writing With AIs

AI-generated text, even if accepted from an ethical standpoint, raises questions about the provenance of the generated text.

AI as (an Ersatz) Natural Science?
From BLOG@CACM

AI as (an Ersatz) Natural Science?

The emergence of large learned models is changing the nature of artificial intelligence research in fundamental ways.

Enterprise Metrics and Optimization
From BLOG@CACM

Enterprise Metrics and Optimization

Metrics are critical; without them, you are flying blind.  But be careful what you try to optimize, because you might just get it.

InnovateFPGA: Wrong Strategy Drives One of the Best FPGA Development Contests into Crisis
From BLOG@CACM

InnovateFPGA: Wrong Strategy Drives One of the Best FPGA Development Contests into Crisis

In my opinion, the main problem of the InnovateFPGA contest is the lack of a permanent team to lead.

Whence Machine Volition?
From BLOG@CACM

Whence Machine Volition?

How could a computer develop or even express volition?

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid
From BLOG@CACM

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid

Avoiding these common, easily preventable blunders will help you maximize success in your career journey.

Biases in Author Recognition
From BLOG@CACM

Biases in Author Recognition

When reading papers, we make simplifications and have assumptions about author roles and relative contributions.

How Scripting Misses the Mark
From BLOG@CACM

How Scripting Misses the Mark

Scripting languages promise easy automation but prove difficult to learn. Let's stop focusing on simplified syntax and instead focus on understandability and learnability...

Students Speak to Ethical Issues
From BLOG@CACM

Students Speak to Ethical Issues

What are the concerns of students after study of computer ethics?

Anti-Sanctions: New Operating System for Mobile Devices
From BLOG@CACM

Anti-Sanctions: New Operating System for Mobile Devices

There comes a time not only of crisis, but also of great opportunities. And here, it is important to take advantage of these new opportunities.

Data Anonymization Using the Random Sum Method
From BLOG@CACM

Data Anonymization Using the Random Sum Method

The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.

Blockchain For What, Exactly?
From BLOG@CACM

Blockchain For What, Exactly?

Considering the real-world consequences of blockchain hype.

R&D or r&d: What's the Difference?
From BLOG@CACM

R&D or r&d: What's the Difference?

Research produces generalized knowledge; Development produces generalized functionality. Not all efforts that use research skills or that use development skills...

Cryptocurs Don't Asportate
From BLOG@CACM

Cryptocurs Don't Asportate

Cryptocurrency on a blockchain cannot be stolen -- it's true.

Log4j and the Thankless High-Risk Task of Managing Software Component Upgrades
From BLOG@CACM

Log4j and the Thankless High-Risk Task of Managing Software Component Upgrades

Managing included versions of third-party software components too often puts developers in no-win situations.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account