acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Navigating the 2023 Cybersecurity Landscape
From BLOG@CACM

Navigating the 2023 Cybersecurity Landscape

The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.

How Did Scientists Succumb to Aunt Edna? The Dangers of a Superintelligent AI is Fiction
From BLOG@CACM

How Did Scientists Succumb to Aunt Edna? The Dangers of a Superintelligent AI is Fiction

Speaking of the existential threat of AI is science fiction, and bad science fiction for that matter because it is not based on anything we know about science,...

A Turning Point for U.S. AI Policy: Senate Explores Solutions
From BLOG@CACM

A Turning Point for U.S. AI Policy: Senate Explores Solutions

Preparing for the proliferation of Artificial Intelligence.

ChatGPT Helps or Hurts our Cybersecurity?
From BLOG@CACM

ChatGPT Helps or Hurts our Cybersecurity?

The specter is that when fully mature, this technology would be able to generate undetectable attacks and the defenders will be constantly fighting these fires....

Cybersecurity Mistakes to Avoid at All Costs
From BLOG@CACM

Cybersecurity Mistakes to Avoid at All Costs

Preventing unauthorized access or misuse of confidential data.

The Urgency of the Technological, Geopolitical, and Sustainability Races
From BLOG@CACM

The Urgency of the Technological, Geopolitical, and Sustainability Races

The HiPEAC Vision 2023.

Why Data Security Is An Issue For Business Phone Systems In 2023
From BLOG@CACM

Why Data Security Is An Issue For Business Phone Systems In 2023

A discussion of the most common phone scams, how they work, and how to protect yourself from them.

AI's Jurassic Park Moment
From BLOG@CACM

AI's Jurassic Park Moment

New systems like chatGPT are enormously entertaining, and even mind-boggling, but also unreliable, and potentially dangerous.

Why Is It Hard to Define Data Science?
From BLOG@CACM

Why Is It Hard to Define Data Science?

Data science can be described as a science, as a research paradigm, as a research method, as a discipline, as a workflow, and as a profession.

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain
From BLOG@CACM

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain

We analyze the operations of the Starlink Global Satellite System deployed by SpaceX, in terms of its security and resilience.

Fair AI Practices
From BLOG@CACM

Fair AI Practices

A new technology, broadly deployed, raises profound questions about its impact on American society.

A Challenge of Membership
From BLOG@CACM

A Challenge of Membership

How can we solve ACM membership fee payment problems for Russians and Belarussians?

Musk Buying Twitter Is Not About Freedom of Speech
From BLOG@CACM

Musk Buying Twitter Is Not About Freedom of Speech

It's about freedom to control speech.

Superhero Secret Identities Aren't Possible with Today's Computing Technologies
From BLOG@CACM

Superhero Secret Identities Aren't Possible with Today's Computing Technologies

In comic books, most superheroes have a secret identity, usually to protect their friends and family from retribution. However, today’s computer technology would...

Software Stories: Legal Trouble
From BLOG@CACM

Software Stories: Legal Trouble

Legal troubles represent another collection of potential pitfalls where developers often find themselves unprepared. 

Safe AI in Education Needs You
From BLOG@CACM

Safe AI in Education Needs You

Artificial intelligence is coming to your learners and will raise challenging issues that need experts like you. Learn how you can get involved in AI and Educational...

What Should be Done About Facebook?
From BLOG@CACM

What Should be Done About Facebook?

The recent release of the Facebook papers by a whistleblower has confirmed that leaders at the company have long known about problems facilitated by their social...

Patent Protection in Europe
From BLOG@CACM

Patent Protection in Europe

Up to the second half of the 19th century —with the exception of the industrial power Great Britain—the protection of inventions was inadequate and strongly disputed...

Competitions, Not Confrontation
From BLOG@CACM

Competitions, Not Confrontation

The ACM as an organizer of international cooperation.  

Auditing AI and Autonomous Systems; Building an Infrastructure of Trust
From BLOG@CACM

Auditing AI and Autonomous Systems; Building an Infrastructure of Trust

How do we build trust? How can we systematically assure trust in our systems? How would auditing AI and autonomous systems contribute to this goal? Explaining...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account