acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

VOT Challenge: Computer Vision Competition
From BLOG@CACM

VOT Challenge: Computer Vision Competition

VOT Challenge is one of the outstanding competitions in computer vision. At the end of this important event this year, I would like to share my opinions about this...

Exponential Protests
From BLOG@CACM

Exponential Protests

Exponential organizations offer an appropriate organized structure for the current Israeli protest, and maybe for other cases of civil resistance.

The Hadoop Ecosystem's Continued Impact
From BLOG@CACM

The Hadoop Ecosystem's Continued Impact

Hadoop owed much to the Google GFS, MapReduce, and BigTable papers, but it was also a response to a broader technology community need. 

Teaching Data Science Research Methods to Human Resources Practitioners – Part 4
From BLOG@CACM

Teaching Data Science Research Methods to Human Resources Practitioners – Part 4

We believe programming experience is crucial for human resources practitioners in the data and tech era.

Navigating the 2023 Cybersecurity Landscape
From BLOG@CACM

Navigating the 2023 Cybersecurity Landscape

The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.

A Turning Point for U.S. AI Policy: Senate Explores Solutions
From BLOG@CACM

A Turning Point for U.S. AI Policy: Senate Explores Solutions

Preparing for the proliferation of Artificial Intelligence.

ChatGPT Helps or Hurts our Cybersecurity?
From BLOG@CACM

ChatGPT Helps or Hurts our Cybersecurity?

The specter is that when fully mature, this technology would be able to generate undetectable attacks and the defenders will be constantly fighting these fires....

A Year Embedded in the Crypto-NFT Space
From BLOG@CACM

A Year Embedded in the Crypto-NFT Space

From digital ownership to artistic communities.

Teaching Data Science Research Methods to Human Resources Practitioners: Part Two
From BLOG@CACM

Teaching Data Science Research Methods to Human Resources Practitioners: Part Two

"When I heard we will be learning Python, I became anxious."

Cybersecurity Mistakes to Avoid at All Costs
From BLOG@CACM

Cybersecurity Mistakes to Avoid at All Costs

Preventing unauthorized access or misuse of confidential data.

Twiddler: Configurability for Me, but Not for Thee
From BLOG@CACM

Twiddler: Configurability for Me, but Not for Thee

Online platform businesses have a distinctly more abusive and sinister character than brick-and-mortar retail chains.

The Urgency of the Technological, Geopolitical, and Sustainability Races
From BLOG@CACM

The Urgency of the Technological, Geopolitical, and Sustainability Races

The HiPEAC Vision 2023.

Enabling AI Projects In An Enterprise
From BLOG@CACM

Enabling AI Projects In An Enterprise

Identifying the development behaviors that have the highest chance of success for artificial intelligence efforts.

The Need For Combined Data And Analytic Governance
From BLOG@CACM

The Need For Combined Data And Analytic Governance

Numbers don't mean anything if people don't understand, or trust, the computation behind them.

Evaluating Research Results for Practical Applications
From BLOG@CACM

Evaluating Research Results for Practical Applications

The role of the application of research results in assessing the achievements of scientists.

Large Language Models like ChatGPT say The Darnedest Things
From BLOG@CACM

Large Language Models like ChatGPT say The Darnedest Things

ChatGPT makes the same kinds of mistakes its predecessors did. What can and should we do about it?

Is Computing Innovation Getting Harder?
From BLOG@CACM

Is Computing Innovation Getting Harder?

Many of us, inside the ivory tower and outside, have felt at times that research is not quite delivering at the rate we hope it would.

Is ChatGPT Really a 'Code Red' for Google Search?
From BLOG@CACM

Is ChatGPT Really a 'Code Red' for Google Search?

Maybe not.

5 Best Practices for Cloud-Based Backup and Recovery in 2023
From BLOG@CACM

5 Best Practices for Cloud-Based Backup and Recovery in 2023

These practices help technical professionals ensure their organizations' data is protected and can be recovered quickly.

The Key to Successful Threat Intelligence
From BLOG@CACM

The Key to Successful Threat Intelligence

A modern Information Security perspective.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account