acm-header
Sign In

Communications of the ACM

Blog at CACM
The Continual Re-Creation Of The Key-Value Datastore
The Continual Re-Creation Of The Key-Value Datastore
08.11.2022

The evolution of single machine key-value stores.

Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education
Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education
08.09.2022

How can machine learning educators help learners cope with the base rate neglect cognitive bias?

Was Ada Lovelace Actually the First Programmer?
Was Ada Lovelace Actually the First Programmer?
08.08.2022

Historical arguments for and against.

View More Blog@CACM

Latest News
Zoom Used In Smuggled Code Attack
Zoom Used In Smuggled Code Attack
08.15.2022

Google Project Zero security researcher Ivan Fratric launched a remote …

The Hacking of Starlink Terminals Has Begun
The Hacking of Starlink Terminals Has Begun
08.12.2022

Lennert Wouters at Belgium's Katholieke Universiteit Leuven hacked SpaceX's Starlink …

Amazon Expands Palm-Scanning Payment Tech to 65 More Whole Foods Locations
Amazon Expands Palm-Scanning Payment Tech to 65 More Whole Foods Locations
08.12.2022

Amazon plans to expand its Amazon One palm-scanner payment technology …

View More News

Video Highlights
Interpretable Machine Learning: Moving from Mythos to Diagnostics
08.01.2022
Interpretable Machine Learning: Moving from Mythos to Diagnostics

A path forward for the ML community to address a stark disconnect.

hXDP: Efficient Software Packet Processing on FPGA NICs
08.01.2022
hXDP: Efficient Software Packet Processing on FPGA NICs

We present hXDP, a solution to run on FPGAs software packet processing tasks described with the eBPF technology and targeting …

View More Video Highlights
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account