acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

On the Evolution of Languages: Natural, Mathematical, and Computational
From BLOG@CACM

On the Evolution of Languages: Natural, Mathematical, and Computational

Comparing the evolution of natural languages, which are used by people all over the world, with two artificial languages: the language of mathematics and programing...

How do Authors' Perceptions about their Papers Compare with Co-Authors' Perceptions and Peer-Review Decisions?
From BLOG@CACM

How do Authors' Perceptions about their Papers Compare with Co-Authors' Perceptions and Peer-Review Decisions?

Does peer review change authors' perception of their own papers?

Can Transaction Costs Explain Scale-Free Networks Born by Preferential Attachment?
From BLOG@CACM

Can Transaction Costs Explain Scale-Free Networks Born by Preferential Attachment?

Centralization leads to more efficient communication and control, which leads to lower transaction costs, which increases the useful work each node can spend on...

Early Computers in Continental Europe
From BLOG@CACM

Early Computers in Continental Europe

About the Bark (binär automatisk relä-kalkylator, binary automatic relay computer) and Besk (binär elektronisk sekvens kalkylator, binary electronic sequential...

Statement Considered Harmful
From BLOG@CACM

Statement Considered Harmful

Instructions are not statements.

AI's Jurassic Park Moment
From BLOG@CACM

AI's Jurassic Park Moment

New systems like chatGPT are enormously entertaining, and even mind-boggling, but also unreliable, and potentially dangerous.

Will Free Open Access Publication Become a Mass Phenomenon?
From BLOG@CACM

Will Free Open Access Publication Become a Mass Phenomenon?

In this blog post, I would like to go over the value of different publication platforms from the point of view of an ordinary scientific researcher.

Bad Reasons to Reject Good Papers, and Vice Versa
From BLOG@CACM

Bad Reasons to Reject Good Papers, and Vice Versa

(or, am I Reviewer #2? Should I be?)

Logical Beats Sequential
From BLOG@CACM

Logical Beats Sequential

Often, "we do this and then we do that" is just a lazy way of stating "to do that, we must have achieved this."

Turing, Churchill, and the Colossus
From BLOG@CACM

Turing, Churchill, and the Colossus

Did Turing collaborate on the Colossus?

Why Is It Hard to Define Data Science?
From BLOG@CACM

Why Is It Hard to Define Data Science?

Data science can be described as a science, as a research paradigm, as a research method, as a discipline, as a workflow, and as a profession.

The Legacy of Peer-to-Peer Systems
From BLOG@CACM

The Legacy of Peer-to-Peer Systems

What happened to peer-to-peer as a technological concept?      

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?
From BLOG@CACM

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?

Hint: It's not all about scaling.

Data Backup and VM Modernization: How-to Guide
From BLOG@CACM

Data Backup and VM Modernization: How-to Guide

A guide to VM modernization when dealing with data backups.

The Process-Object Duality in Computer Science and Data Science Education
From BLOG@CACM

The Process-Object Duality in Computer Science and Data Science Education

The process-object duality has several educational implications for the design of teaching and learning processes.

Stack Ranking: Organizational Cancer
From BLOG@CACM

Stack Ranking: Organizational Cancer

If only the best are hired, why isn't everybody great?

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain
From BLOG@CACM

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain

We analyze the operations of the Starlink Global Satellite System deployed by SpaceX, in terms of its security and resilience.

Choosing a DAST Solution: What to Pay Attention To
From BLOG@CACM

Choosing a DAST Solution: What to Pay Attention To

The tool characteristics and parameters you need to pay attention to, and the product types currently available on the market.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

Data Governance and the Psychology of Tension Management
From BLOG@CACM

Data Governance and the Psychology of Tension Management

The balancing of the chaos of no data tension and too much tension on data assets is what data governance frameworks and processes attempt to manage.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account