acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

All Photos are Fake Until Proven Real
From BLOG@CACM

All Photos are Fake Until Proven Real

The blurred lines of photographic reality in the AI Era.

Let's Be Objective about Large Language Models
From BLOG@CACM

Let's Be Objective about Large Language Models

Objective evaluation of the linguistic competency of large language models (LLMs) is of paramount importance as we start contemplating the use of this technology...

How to Ace IT Product Localization: The 101 Guide
From BLOG@CACM

How to Ace IT Product Localization: The 101 Guide

Unlock global success with IT product localization. Discover how you can expand your reach and boost customer satisfaction through effective localization strategies...

Face It, Self-Driving Cars Still Haven't Earned Their Stripes
From BLOG@CACM

Face It, Self-Driving Cars Still Haven't Earned Their Stripes

Edge cases remain a serious, unsolved problem, $100 billion later.

Federated Learning: How Private Is It Really?
From BLOG@CACM

Federated Learning: How Private Is It Really?

Just when it looks like Federated Learning is able to keep local data private, out comes a study to deflate us.

VOT Challenge: Computer Vision Competition
From BLOG@CACM

VOT Challenge: Computer Vision Competition

VOT Challenge is one of the outstanding competitions in computer vision. At the end of this important event this year, I would like to share my opinions about this...

The Hadoop Ecosystem's Continued Impact
From BLOG@CACM

The Hadoop Ecosystem's Continued Impact

Hadoop owed much to the Google GFS, MapReduce, and BigTable papers, but it was also a response to a broader technology community need. 

How Did Scientists Succumb to Aunt Edna? The Dangers of a Superintelligent AI is Fiction
From BLOG@CACM

How Did Scientists Succumb to Aunt Edna? The Dangers of a Superintelligent AI is Fiction

Speaking of the existential threat of AI is science fiction, and bad science fiction for that matter because it is not based on anything we know about science,...

A Year Embedded in the Crypto-NFT Space
From BLOG@CACM

A Year Embedded in the Crypto-NFT Space

From digital ownership to artistic communities.

Artificial Intelligence Without Real Intelligence?
From BLOG@CACM

Artificial Intelligence Without Real Intelligence?

Do the programs understand what they write?

What Google Should Really Be Worried About
From BLOG@CACM

What Google Should Really Be Worried About

How sewers of lies could spell the end of Web search.

The Need For Combined Data And Analytic Governance
From BLOG@CACM

The Need For Combined Data And Analytic Governance

Numbers don't mean anything if people don't understand, or trust, the computation behind them.

ChatGPT in Computer Science Education
From BLOG@CACM

ChatGPT in Computer Science Education

Asked "How will ChatGPT influence computer science education?" teachers barely addressed the threats it poses.

Evaluating Research Results for Practical Applications
From BLOG@CACM

Evaluating Research Results for Practical Applications

The role of the application of research results in assessing the achievements of scientists.

Is ChatGPT Really a 'Code Red' for Google Search?
From BLOG@CACM

Is ChatGPT Really a 'Code Red' for Google Search?

Maybe not.

Logical Beats Sequential
From BLOG@CACM

Logical Beats Sequential

Often, "we do this and then we do that" is just a lazy way of stating "to do that, we must have achieved this."

The Continual Re-Creation Of The Key-Value Datastore
From BLOG@CACM

The Continual Re-Creation Of The Key-Value Datastore

The evolution of single machine key-value stores.

Communing on Computing
From BLOG@CACM

Communing on Computing

 Conferences can renew our professional commitment and inspire thought on problems we face.

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid
From BLOG@CACM

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid

Avoiding these common, easily preventable blunders will help you maximize success in your career journey.

Data Anonymization Using the Random Sum Method
From BLOG@CACM

Data Anonymization Using the Random Sum Method

The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account