The last week of October in the year 2023 may be remembered as the week when lawmakers made a real effort to outpace technology.
Marc Rotenberg From BLOG@CACM | November 6, 2023 at 03:09 PM
Here is a quick take on what to look for in Washington and on the broader AI Policy landscape when Congress returns in September.
Marc Rotenberg From BLOG@CACM | August 24, 2023 at 11:01 AM
The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.
Alex Vakulov From BLOG@CACM | May 31, 2023 at 11:26 AM
Speaking of the existential threat of AI is science fiction, and bad science fiction for that matter because it is not based on anything we know about science,...Walid S. Saba From BLOG@CACM | May 23, 2023 at 07:52 PM
The specter is that when fully mature, this technology would be able to generate undetectable attacks and the defenders will be constantly fighting these fires....Saurabh Bagchi From BLOG@CACM | April 18, 2023 at 12:45 PM
A discussion of the most common phone scams, how they work, and how to protect yourself from them.
Alex Tray From BLOG@CACM | January 24, 2023 at 03:24 PM
New systems like chatGPT are enormously entertaining, and even mind-boggling, but also unreliable, and potentially dangerous.
Gary Marcus From BLOG@CACM | December 12, 2022 at 03:01 PM
Data science can be described as a science, as a research paradigm, as a research method, as a discipline, as a workflow, and as a profession.
Koby Mike and Orit Hazzan From BLOG@CACM | December 2, 2022 at 04:01 PM
We analyze the operations of the Starlink Global Satellite System deployed by SpaceX, in terms of its security and resilience.
Andrei Sukhov, Evgeny Sagatov, and Dmitry Filimonov From BLOG@CACM | October 27, 2022 at 04:53 PM
A new technology, broadly deployed, raises profound questions about its impact on American society.
Marc Rotenberg From BLOG@CACM | October 12, 2022 at 12:21 PM
In comic books, most superheroes have a secret identity, usually to protect their friends and family from retribution. However, today’s computer technology would...Jason Hong From BLOG@CACM | January 24, 2022 at 09:12 AM