acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

The Life-or-Death Importance of Medical Device Security
From BLOG@CACM

The Life-or-Death Importance of Medical Device Security

Cybersecurity was not always top of mind when these devices were being created.

Coaxing Performance from the Complexity of HPC
From BLOG@CACM

Coaxing Performance from the Complexity of HPC

Network latency and HPC performance.

The Dissemination Game: Incentives of In-Person vs Virtual Participation
From BLOG@CACM

The Dissemination Game: Incentives of In-Person vs Virtual Participation

Incentives are changing the effectiveness of computer science conferences, but perhaps better conference design can improve them.

Automatic Language Translation Still Unsatisfactory
From BLOG@CACM

Automatic Language Translation Still Unsatisfactory

Google Translate and DeepL Translate still have trouble recognizing the second person singular and plural and the polite form, even in very simple sentences.

Artificial Intelligence Without Real Intelligence?
From BLOG@CACM

Artificial Intelligence Without Real Intelligence?

Do the programs understand what they write?

Twiddler: Configurability for Me, but Not for Thee
From BLOG@CACM

Twiddler: Configurability for Me, but Not for Thee

Online platform businesses have a distinctly more abusive and sinister character than brick-and-mortar retail chains.

Why Data Security Is An Issue For Business Phone Systems In 2023
From BLOG@CACM

Why Data Security Is An Issue For Business Phone Systems In 2023

A discussion of the most common phone scams, how they work, and how to protect yourself from them.

ChatGPT in Computer Science Education
From BLOG@CACM

ChatGPT in Computer Science Education

Asked "How will ChatGPT influence computer science education?" teachers barely addressed the threats it poses.

On the Evolution of Languages: Natural, Mathematical, and Computational
From BLOG@CACM

On the Evolution of Languages: Natural, Mathematical, and Computational

Comparing the evolution of natural languages, which are used by people all over the world, with two artificial languages: the language of mathematics and programing...

Can Transaction Costs Explain Scale-Free Networks Born by Preferential Attachment?
From BLOG@CACM

Can Transaction Costs Explain Scale-Free Networks Born by Preferential Attachment?

Centralization leads to more efficient communication and control, which leads to lower transaction costs, which increases the useful work each node can spend on...

Will Free Open Access Publication Become a Mass Phenomenon?
From BLOG@CACM

Will Free Open Access Publication Become a Mass Phenomenon?

In this blog post, I would like to go over the value of different publication platforms from the point of view of an ordinary scientific researcher.

The Legacy of Peer-to-Peer Systems
From BLOG@CACM

The Legacy of Peer-to-Peer Systems

What happened to peer-to-peer as a technological concept?      

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain
From BLOG@CACM

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain

We analyze the operations of the Starlink Global Satellite System deployed by SpaceX, in terms of its security and resilience.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account