acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Evaluating Research Results for Practical Applications
From BLOG@CACM

Evaluating Research Results for Practical Applications

The role of the application of research results in assessing the achievements of scientists.

Large Language Models like ChatGPT say The Darnedest Things
From BLOG@CACM

Large Language Models like ChatGPT say The Darnedest Things

ChatGPT makes the same kinds of mistakes its predecessors did. What can and should we do about it?

The ChatAlgebra Educational Revolution
From BLOG@CACM

The ChatAlgebra Educational Revolution

We need a ChatAlgebra revolution to reduce the gatekeeping role of the traditional Algebra course, to ameliorate the student suffering associated with the traditional...

What to Expect When You're Expecting ... GPT-4
From BLOG@CACM

What to Expect When You're Expecting ... GPT-4

What comes after ChatGPT? Seven predictions for 2023.

Is Computing Innovation Getting Harder?
From BLOG@CACM

Is Computing Innovation Getting Harder?

Many of us, inside the ivory tower and outside, have felt at times that research is not quite delivering at the rate we hope it would.

Is ChatGPT Really a 'Code Red' for Google Search?
From BLOG@CACM

Is ChatGPT Really a 'Code Red' for Google Search?

Maybe not.

Inorganic Growth In Tech: Getting Shredded with Acquisitions
From BLOG@CACM

Inorganic Growth In Tech: Getting Shredded with Acquisitions

Acquisitions happen quite often in the tech industry and are far more complicated to pull off successfully than popping a pill.

5 Best Practices for Cloud-Based Backup and Recovery in 2023
From BLOG@CACM

5 Best Practices for Cloud-Based Backup and Recovery in 2023

These practices help technical professionals ensure their organizations' data is protected and can be recovered quickly.

Observation of Bias
From BLOG@CACM

Observation of Bias

It may not be that obvious, but it's observable.

The Key to Successful Threat Intelligence
From BLOG@CACM

The Key to Successful Threat Intelligence

A modern Information Security perspective.

On the Evolution of Languages: Natural, Mathematical, and Computational
From BLOG@CACM

On the Evolution of Languages: Natural, Mathematical, and Computational

Comparing the evolution of natural languages, which are used by people all over the world, with two artificial languages: the language of mathematics and programing...

How do Authors' Perceptions about their Papers Compare with Co-Authors' Perceptions and Peer-Review Decisions?
From BLOG@CACM

How do Authors' Perceptions about their Papers Compare with Co-Authors' Perceptions and Peer-Review Decisions?

Does peer review change authors' perception of their own papers?

Can Transaction Costs Explain Scale-Free Networks Born by Preferential Attachment?
From BLOG@CACM

Can Transaction Costs Explain Scale-Free Networks Born by Preferential Attachment?

Centralization leads to more efficient communication and control, which leads to lower transaction costs, which increases the useful work each node can spend on...

AI's Jurassic Park Moment
From BLOG@CACM

AI's Jurassic Park Moment

New systems like chatGPT are enormously entertaining, and even mind-boggling, but also unreliable, and potentially dangerous.

Will Free Open Access Publication Become a Mass Phenomenon?
From BLOG@CACM

Will Free Open Access Publication Become a Mass Phenomenon?

In this blog post, I would like to go over the value of different publication platforms from the point of view of an ordinary scientific researcher.

Logical Beats Sequential
From BLOG@CACM

Logical Beats Sequential

Often, "we do this and then we do that" is just a lazy way of stating "to do that, we must have achieved this."

Turing, Churchill, and the Colossus
From BLOG@CACM

Turing, Churchill, and the Colossus

Did Turing collaborate on the Colossus?

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?
From BLOG@CACM

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?

Hint: It's not all about scaling.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

Which Were the Most Influential Early Computers?
From BLOG@CACM

Which Were the Most Influential Early Computers?

Considering early machines that had the greatest influence on the development of program-controlled computers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account