acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Cyber Security at the movies: Rogue one (Part II: Authentication)
From CS4FN (Computer Science For Fun)

Cyber Security at the movies: Rogue one (Part II: Authentication)

In a galaxy far, far away cyber security matters. So much so, that the whole film Rogue One is about it. Part of the key to keeping the Death Star plans secret...

Cyber Security at the movies: Rogue one (Part I: Physical Security)
From CS4FN (Computer Science For Fun)

Cyber Security at the movies: Rogue one (Part I: Physical Security)

In a galaxy far, far away cyber security matters quite a lot. So much so, in fact, that the whole film Rogue One is about it. The plot is all about the bad guys...

When a chatbot acts as your “trusted” agent …
From CS4FN (Computer Science For Fun)

When a chatbot acts as your “trusted” agent …

Artificial Intelligences are capable of acting as our agents freeing up our time, but can we trust them? Steve Phelps and his team run experiments with AIs as the...

Nurses in the mist
From CS4FN (Computer Science For Fun)

Nurses in the mist

What do you do when your boss tells you "go and invent a new product"? Lock yourself away and stare out the window? Go for a walk, waiting for inspiration? Medical...

Screaming Headline Kills!!!
From CS4FN (Computer Science For Fun)

Screaming Headline Kills!!!

Medical mistakes can make a big news story with screaming headlines vilifying those 'responsible'. It may sell papers. Research by Chrystie Myketiak suggested it...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account