acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.

On the Ethics of Writing With AIs
From BLOG@CACM

On the Ethics of Writing With AIs

AI-generated text, even if accepted from an ethical standpoint, raises questions about the provenance of the generated text.

Why Are There So Many Programming Languages?
From BLOG@CACM

Why Are There So Many Programming Languages?

Most languages differ less in what they make possible, and more in terms of what they make easy. 

AI as (an Ersatz) Natural Science?
From BLOG@CACM

AI as (an Ersatz) Natural Science?

The emergence of large learned models is changing the nature of artificial intelligence research in fundamental ways.

Enterprise Metrics and Optimization
From BLOG@CACM

Enterprise Metrics and Optimization

Metrics are critical; without them, you are flying blind.  But be careful what you try to optimize, because you might just get it.

InnovateFPGA: Wrong Strategy Drives One of the Best FPGA Development Contests into Crisis
From BLOG@CACM

InnovateFPGA: Wrong Strategy Drives One of the Best FPGA Development Contests into Crisis

In my opinion, the main problem of the InnovateFPGA contest is the lack of a permanent team to lead.

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid
From BLOG@CACM

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid

Avoiding these common, easily preventable blunders will help you maximize success in your career journey.

Making Bad Decisions
From BLOG@CACM

Making Bad Decisions

In software engineering, many technical decisions are context-dependent, and there are often complex edge cases to consider. 

High-Performance Mobile System-on-Chip Clusters
From BLOG@CACM

High-Performance Mobile System-on-Chip Clusters

Simply stating the problem is not enough; it is necessary to look for a quick way out of the situation, relying on available resources.

Data Anonymization Using the Random Sum Method
From BLOG@CACM

Data Anonymization Using the Random Sum Method

The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.

Essentials of BI Dashboards
From BLOG@CACM

Essentials of BI Dashboards

A well-designed dashboard is everyone's dream come true.

Cultivating Habits: -1 +2 for Researchers
From BLOG@CACM

Cultivating Habits: -1 +2 for Researchers

The New Year is stereotypically the time when we resolve to start some good habits and get rid of some of the bad.

Publishing, The Choice and The Luck
From BLOG@CACM

Publishing, The Choice and The Luck

Selecting publishing targets is a process with no simple solutions.

How to Reduce the Carbon Emissions of Your Website
From BLOG@CACM

How to Reduce the Carbon Emissions of Your Website

We can control our online ecological impact.

Language Imitation Games and the Arrival of Broad and Shallow AI
From BLOG@CACM

Language Imitation Games and the Arrival of Broad and Shallow AI

On the impact of large language models.

We Are Camille
From BLOG@CACM

We Are Camille

Who is Camille Noûs, who has contributed to hundreds of papers on Google Scholar?

How Does One Divide with Napier's Rods?
From BLOG@CACM

How Does One Divide with Napier's Rods?

Napier's multiplication and division rods, deriving from the basic multiplication table, simplify calculations considerably.

Understanding NoSQL Database Types: Key Value   
From BLOG@CACM

Understanding NoSQL Database Types: Key Value   

Of all non-relationals, the key-value store is by far the most popular due to its extreme simplicity.

New Areas for Application of Self-Organizing Routing
From BLOG@CACM

New Areas for Application of Self-Organizing Routing

To organize the productive work of multiprocessor chips, it is necessary to establish an efficient distribution of computational processes between computational...

Understanding NoSQL Database Types: Document
From BLOG@CACM

Understanding NoSQL Database Types: Document

Document databases are particularly useful in app development.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account