acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

When Data Worlds Collide
From BLOG@CACM

When Data Worlds Collide

Critical sections in analytic workflows.

How to Ace IT Product Localization: The 101 Guide
From BLOG@CACM

How to Ace IT Product Localization: The 101 Guide

Unlock global success with IT product localization. Discover how you can expand your reach and boost customer satisfaction through effective localization strategies...

What Does AI-Powered Microsoft Bing Say?
From BLOG@CACM

What Does AI-Powered Microsoft Bing Say?

The answers from the AI-powered Microsoft Bing are often useless.

ChatGPT Helps or Hurts our Cybersecurity?
From BLOG@CACM

ChatGPT Helps or Hurts our Cybersecurity?

The specter is that when fully mature, this technology would be able to generate undetectable attacks and the defenders will be constantly fighting these fires....

Artificial Intelligence Without Real Intelligence?
From BLOG@CACM

Artificial Intelligence Without Real Intelligence?

Do the programs understand what they write?

Serendipity: When Research in One Area Leads to a Positive Result in Another
From BLOG@CACM

Serendipity: When Research in One Area Leads to a Positive Result in Another

A problem of the extremely optimal family of circulant graphs: when research in one scientific field gives an unexpected result in another.

The Need For Combined Data And Analytic Governance
From BLOG@CACM

The Need For Combined Data And Analytic Governance

Numbers don't mean anything if people don't understand, or trust, the computation behind them.

Inorganic Growth In Tech: Getting Shredded with Acquisitions
From BLOG@CACM

Inorganic Growth In Tech: Getting Shredded with Acquisitions

Acquisitions happen quite often in the tech industry and are far more complicated to pull off successfully than popping a pill.

On the Evolution of Languages: Natural, Mathematical, and Computational
From BLOG@CACM

On the Evolution of Languages: Natural, Mathematical, and Computational

Comparing the evolution of natural languages, which are used by people all over the world, with two artificial languages: the language of mathematics and programing...

AI's Jurassic Park Moment
From BLOG@CACM

AI's Jurassic Park Moment

New systems like chatGPT are enormously entertaining, and even mind-boggling, but also unreliable, and potentially dangerous.

Logical Beats Sequential
From BLOG@CACM

Logical Beats Sequential

Often, "we do this and then we do that" is just a lazy way of stating "to do that, we must have achieved this."

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

The Legacy of Barry Boehm
From BLOG@CACM

The Legacy of Barry Boehm

One of the founders of software engineering as we know it.

Common Mistakes When Building BI Dashboards
From BLOG@CACM

Common Mistakes When Building BI Dashboards

Business Intelligence is not only about reporting; you should be telling a story through data.

A Standard Plan for Modern Requirements
From BLOG@CACM

A Standard Plan for Modern Requirements

The ambitious systems that we develop today need a proper requirements structure. The plan defined here organizes requirements specification along four books, the...

Understanding NoSQL Database Types: Document
From BLOG@CACM

Understanding NoSQL Database Types: Document

Document databases are particularly useful in app development.

NoSQL: A Beginner's Guide
From BLOG@CACM

NoSQL: A Beginner's Guide

What exactly is NoSQL, and why should it matter in today's hyper-connected society?

Closing the 'Trust Gap' in Contact Tracing/Exposure Notification Technology
From BLOG@CACM

Closing the 'Trust Gap' in Contact Tracing/Exposure Notification Technology

The digitization of contact tracing presents an array of challenges.

Automatic Translators are Not Really Capable of Learning
From BLOG@CACM

Automatic Translators are Not Really Capable of Learning

One does not get the impression the Google Translate and DeepL translation programs are self-learning and have made real progress.

Hacking the Axis
From BLOG@CACM

Hacking the Axis

The role of early high-performance computing capabilities in World War II.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account