acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

That Was The Week That Was
From BLOG@CACM

That Was The Week That Was

The last week of October in the year 2023 may be remembered as the week when lawmakers made a real effort to outpace technology.

All Photos are Fake Until Proven Real
From BLOG@CACM

All Photos are Fake Until Proven Real

The blurred lines of photographic reality in the AI Era.

The Life-or-Death Importance of Medical Device Security
From BLOG@CACM

The Life-or-Death Importance of Medical Device Security

Cybersecurity was not always top of mind when these devices were being created.

Everything. Everywhere. All at Once: AI Policy When Congress Returns
From BLOG@CACM

Everything. Everywhere. All at Once: AI Policy When Congress Returns

Here is a quick take on what to look for in Washington and on the broader AI Policy landscape when Congress returns in September.

Face It, Self-Driving Cars Still Haven't Earned Their Stripes
From BLOG@CACM

Face It, Self-Driving Cars Still Haven't Earned Their Stripes

Edge cases remain a serious, unsolved problem, $100 billion later.

Why They're Worried
From BLOG@CACM

Why They're Worried

Summarizing experts' motivations for signing the 'Pause Letter.'

Navigating the 2023 Cybersecurity Landscape
From BLOG@CACM

Navigating the 2023 Cybersecurity Landscape

The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.

How Did Scientists Succumb to Aunt Edna? The Dangers of a Superintelligent AI is Fiction
From BLOG@CACM

How Did Scientists Succumb to Aunt Edna? The Dangers of a Superintelligent AI is Fiction

Speaking of the existential threat of AI is science fiction, and bad science fiction for that matter because it is not based on anything we know about science,...

A Turning Point for U.S. AI Policy: Senate Explores Solutions
From BLOG@CACM

A Turning Point for U.S. AI Policy: Senate Explores Solutions

Preparing for the proliferation of Artificial Intelligence.

ChatGPT Helps or Hurts our Cybersecurity?
From BLOG@CACM

ChatGPT Helps or Hurts our Cybersecurity?

The specter is that when fully mature, this technology would be able to generate undetectable attacks and the defenders will be constantly fighting these fires....

Cybersecurity Mistakes to Avoid at All Costs
From BLOG@CACM

Cybersecurity Mistakes to Avoid at All Costs

Preventing unauthorized access or misuse of confidential data.

The Urgency of the Technological, Geopolitical, and Sustainability Races
From BLOG@CACM

The Urgency of the Technological, Geopolitical, and Sustainability Races

The HiPEAC Vision 2023.

Why Data Security Is An Issue For Business Phone Systems In 2023
From BLOG@CACM

Why Data Security Is An Issue For Business Phone Systems In 2023

A discussion of the most common phone scams, how they work, and how to protect yourself from them.

AI's Jurassic Park Moment
From BLOG@CACM

AI's Jurassic Park Moment

New systems like chatGPT are enormously entertaining, and even mind-boggling, but also unreliable, and potentially dangerous.

Why Is It Hard to Define Data Science?
From BLOG@CACM

Why Is It Hard to Define Data Science?

Data science can be described as a science, as a research paradigm, as a research method, as a discipline, as a workflow, and as a profession.

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain
From BLOG@CACM

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain

We analyze the operations of the Starlink Global Satellite System deployed by SpaceX, in terms of its security and resilience.

Fair AI Practices
From BLOG@CACM

Fair AI Practices

A new technology, broadly deployed, raises profound questions about its impact on American society.

A Challenge of Membership
From BLOG@CACM

A Challenge of Membership

How can we solve ACM membership fee payment problems for Russians and Belarussians?

Musk Buying Twitter Is Not About Freedom of Speech
From BLOG@CACM

Musk Buying Twitter Is Not About Freedom of Speech

It's about freedom to control speech.

Superhero Secret Identities Aren't Possible with Today's Computing Technologies
From BLOG@CACM

Superhero Secret Identities Aren't Possible with Today's Computing Technologies

In comic books, most superheroes have a secret identity, usually to protect their friends and family from retribution. However, today’s computer technology would...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account