acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

A Turning Point for U.S. AI Policy: Senate Explores Solutions
From BLOG@CACM

A Turning Point for U.S. AI Policy: Senate Explores Solutions

Preparing for the proliferation of Artificial Intelligence.

ChatGPT Helps or Hurts our Cybersecurity?
From BLOG@CACM

ChatGPT Helps or Hurts our Cybersecurity?

The specter is that when fully mature, this technology would be able to generate undetectable attacks and the defenders will be constantly fighting these fires....

A Year Embedded in the Crypto-NFT Space
From BLOG@CACM

A Year Embedded in the Crypto-NFT Space

From digital ownership to artistic communities.

Teaching Data Science Research Methods to Human Resources Practitioners: Part Two
From BLOG@CACM

Teaching Data Science Research Methods to Human Resources Practitioners: Part Two

"When I heard we will be learning Python, I became anxious."

Cybersecurity Mistakes to Avoid at All Costs
From BLOG@CACM

Cybersecurity Mistakes to Avoid at All Costs

Preventing unauthorized access or misuse of confidential data.

Twiddler: Configurability for Me, but Not for Thee
From BLOG@CACM

Twiddler: Configurability for Me, but Not for Thee

Online platform businesses have a distinctly more abusive and sinister character than brick-and-mortar retail chains.

The Urgency of the Technological, Geopolitical, and Sustainability Races
From BLOG@CACM

The Urgency of the Technological, Geopolitical, and Sustainability Races

The HiPEAC Vision 2023.

Enabling AI Projects In An Enterprise
From BLOG@CACM

Enabling AI Projects In An Enterprise

Identifying the development behaviors that have the highest chance of success for artificial intelligence efforts.

The Need For Combined Data And Analytic Governance
From BLOG@CACM

The Need For Combined Data And Analytic Governance

Numbers don't mean anything if people don't understand, or trust, the computation behind them.

Evaluating Research Results for Practical Applications
From BLOG@CACM

Evaluating Research Results for Practical Applications

The role of the application of research results in assessing the achievements of scientists.

Large Language Models like ChatGPT say The Darnedest Things
From BLOG@CACM

Large Language Models like ChatGPT say The Darnedest Things

ChatGPT makes the same kinds of mistakes its predecessors did. What can and should we do about it?

Is Computing Innovation Getting Harder?
From BLOG@CACM

Is Computing Innovation Getting Harder?

Many of us, inside the ivory tower and outside, have felt at times that research is not quite delivering at the rate we hope it would.

Is ChatGPT Really a 'Code Red' for Google Search?
From BLOG@CACM

Is ChatGPT Really a 'Code Red' for Google Search?

Maybe not.

5 Best Practices for Cloud-Based Backup and Recovery in 2023
From BLOG@CACM

5 Best Practices for Cloud-Based Backup and Recovery in 2023

These practices help technical professionals ensure their organizations' data is protected and can be recovered quickly.

The Key to Successful Threat Intelligence
From BLOG@CACM

The Key to Successful Threat Intelligence

A modern Information Security perspective.

How do Authors' Perceptions about their Papers Compare with Co-Authors' Perceptions and Peer-Review Decisions?
From BLOG@CACM

How do Authors' Perceptions about their Papers Compare with Co-Authors' Perceptions and Peer-Review Decisions?

Does peer review change authors' perception of their own papers?

AI's Jurassic Park Moment
From BLOG@CACM

AI's Jurassic Park Moment

New systems like chatGPT are enormously entertaining, and even mind-boggling, but also unreliable, and potentially dangerous.

Logical Beats Sequential
From BLOG@CACM

Logical Beats Sequential

Often, "we do this and then we do that" is just a lazy way of stating "to do that, we must have achieved this."

Why Is It Hard to Define Data Science?
From BLOG@CACM

Why Is It Hard to Define Data Science?

Data science can be described as a science, as a research paradigm, as a research method, as a discipline, as a workflow, and as a profession.

The Legacy of Peer-to-Peer Systems
From BLOG@CACM

The Legacy of Peer-to-Peer Systems

What happened to peer-to-peer as a technological concept?      
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account