acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Beyond Passwords: The Path to Stronger Authentication Mechanisms
From BLOG@CACM

Beyond Passwords: The Path to Stronger Authentication Mechanisms

The inherent risks associated with passwords stem from their very nature.

ChatGPT Helps or Hurts our Cybersecurity?
From BLOG@CACM

ChatGPT Helps or Hurts our Cybersecurity?

The specter is that when fully mature, this technology would be able to generate undetectable attacks and the defenders will be constantly fighting these fires....

A Year Embedded in the Crypto-NFT Space
From BLOG@CACM

A Year Embedded in the Crypto-NFT Space

From digital ownership to artistic communities.

The Imperativity of Algorithms
From BLOG@CACM

The Imperativity of Algorithms

The important named algorithms that we call upon deserve a robust ontology.

Artificial Intelligence Without Real Intelligence?
From BLOG@CACM

Artificial Intelligence Without Real Intelligence?

Do the programs understand what they write?

Enabling AI Projects In An Enterprise
From BLOG@CACM

Enabling AI Projects In An Enterprise

Identifying the development behaviors that have the highest chance of success for artificial intelligence efforts.

Why *is* Bing So Reckless?
From BLOG@CACM

Why *is* Bing So Reckless?

And how did some prominent journalists utterly miss this initially?

Using GitHub CoPilot is Like Having a Superpower
From BLOG@CACM

Using GitHub CoPilot is Like Having a Superpower

With the advent of Large Language Models (LLMs) and tools like GitHub CoPilot, I think we’re a step closer towards a world where software can be created by anyone...

What Google Should Really Be Worried About
From BLOG@CACM

What Google Should Really Be Worried About

How sewers of lies could spell the end of Web search.

Inside the Heart of ChatGPT's Darkness
From BLOG@CACM

Inside the Heart of ChatGPT's Darkness

A Nightmare on LLM Street.

The Need For Combined Data And Analytic Governance
From BLOG@CACM

The Need For Combined Data And Analytic Governance

Numbers don't mean anything if people don't understand, or trust, the computation behind them.

Evaluating Research Results for Practical Applications
From BLOG@CACM

Evaluating Research Results for Practical Applications

The role of the application of research results in assessing the achievements of scientists.

Large Language Models like ChatGPT say The Darnedest Things
From BLOG@CACM

Large Language Models like ChatGPT say The Darnedest Things

ChatGPT makes the same kinds of mistakes its predecessors did. What can and should we do about it?

Is ChatGPT Really a 'Code Red' for Google Search?
From BLOG@CACM

Is ChatGPT Really a 'Code Red' for Google Search?

Maybe not.

How do Authors' Perceptions about their Papers Compare with Co-Authors' Perceptions and Peer-Review Decisions?
From BLOG@CACM

How do Authors' Perceptions about their Papers Compare with Co-Authors' Perceptions and Peer-Review Decisions?

Does peer review change authors' perception of their own papers?

AI's Jurassic Park Moment
From BLOG@CACM

AI's Jurassic Park Moment

New systems like chatGPT are enormously entertaining, and even mind-boggling, but also unreliable, and potentially dangerous.

Turing, Churchill, and the Colossus
From BLOG@CACM

Turing, Churchill, and the Colossus

Did Turing collaborate on the Colossus?

The Legacy of Peer-to-Peer Systems
From BLOG@CACM

The Legacy of Peer-to-Peer Systems

What happened to peer-to-peer as a technological concept?      

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?
From BLOG@CACM

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?

Hint: It's not all about scaling.

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain
From BLOG@CACM

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain

We analyze the operations of the Starlink Global Satellite System deployed by SpaceX, in terms of its security and resilience.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account