acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Sensibles of Software Engineering, 1 and 2
From BLOG@CACM

Sensibles of Software Engineering, 1 and 2

Common-sense rules, which projects violate again and again.

When Data Worlds Collide
From BLOG@CACM

When Data Worlds Collide

Critical sections in analytic workflows.

Social Protest, War, and the Organizational Culture of the Israeli Science and Engineering Academia
From BLOG@CACM

Social Protest, War, and the Organizational Culture of the Israeli Science and Engineering Academia

Our institution's organizational culture has changed; social and political issues now constitute a vital part of the discourse taking place on campus and on the...

That Was The Week That Was
From BLOG@CACM

That Was The Week That Was

The last week of October in the year 2023 may be remembered as the week when lawmakers made a real effort to outpace technology.

The Perils of 'Stay In Your Lane'
From BLOG@CACM

The Perils of 'Stay In Your Lane'

That phrase translates roughly to "do your job and let others do theirs," but in our division, it was intended to stifle troublesome question-asking.

All Photos are Fake Until Proven Real
From BLOG@CACM

All Photos are Fake Until Proven Real

The blurred lines of photographic reality in the AI Era.

How to Ace IT Product Localization: The 101 Guide
From BLOG@CACM

How to Ace IT Product Localization: The 101 Guide

Unlock global success with IT product localization. Discover how you can expand your reach and boost customer satisfaction through effective localization strategies...

The Life-or-Death Importance of Medical Device Security
From BLOG@CACM

The Life-or-Death Importance of Medical Device Security

Cybersecurity was not always top of mind when these devices were being created.

Face It, Self-Driving Cars Still Haven't Earned Their Stripes
From BLOG@CACM

Face It, Self-Driving Cars Still Haven't Earned Their Stripes

Edge cases remain a serious, unsolved problem, $100 billion later.

Duped No More: Navigating the Maze of Social Engineering Schemes
From BLOG@CACM

Duped No More: Navigating the Maze of Social Engineering Schemes

The best way to guard against becoming a target of social engineering is to familiarize yourself with the strategies, psychological hooks, and technological means...

Federated Learning: How Private Is It Really?
From BLOG@CACM

Federated Learning: How Private Is It Really?

Just when it looks like Federated Learning is able to keep local data private, out comes a study to deflate us.

Automated Tests Are the Safety Net
From BLOG@CACM

Automated Tests Are the Safety Net

Automated testing in software development significantly diminishes routine work and saves time, allowing programmers to work more effectively.

The Dissemination Game: Incentives of In-Person vs Virtual Participation
From BLOG@CACM

The Dissemination Game: Incentives of In-Person vs Virtual Participation

Incentives are changing the effectiveness of computer science conferences, but perhaps better conference design can improve them.

Egalitarian Authorship
From BLOG@CACM

Egalitarian Authorship

Is there a way to provide egalitarian authorship to papers?

Lessons from PL/I:  A Most Ambitious Programming Language
From BLOG@CACM

Lessons from PL/I: A Most Ambitious Programming Language

PL/I stands for Programming Language 1, and its aim was to be the Highlander of programming languages. 

VOT Challenge: Computer Vision Competition
From BLOG@CACM

VOT Challenge: Computer Vision Competition

VOT Challenge is one of the outstanding competitions in computer vision. At the end of this important event this year, I would like to share my opinions about this...

Exponential Protests
From BLOG@CACM

Exponential Protests

Exponential organizations offer an appropriate organized structure for the current Israeli protest, and maybe for other cases of civil resistance.

The Hadoop Ecosystem's Continued Impact
From BLOG@CACM

The Hadoop Ecosystem's Continued Impact

Hadoop owed much to the Google GFS, MapReduce, and BigTable papers, but it was also a response to a broader technology community need. 

Teaching Data Science Research Methods to Human Resources Practitioners – Part 4
From BLOG@CACM

Teaching Data Science Research Methods to Human Resources Practitioners – Part 4

We believe programming experience is crucial for human resources practitioners in the data and tech era.

Navigating the 2023 Cybersecurity Landscape
From BLOG@CACM

Navigating the 2023 Cybersecurity Landscape

The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account