acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

A Year Embedded in the Crypto-NFT Space
From BLOG@CACM

A Year Embedded in the Crypto-NFT Space

From digital ownership to artistic communities.

Teaching Data Science Research Methods to Human Resources Practitioners: Part Two
From BLOG@CACM

Teaching Data Science Research Methods to Human Resources Practitioners: Part Two

"When I heard we will be learning Python, I became anxious."

The Need For Combined Data And Analytic Governance
From BLOG@CACM

The Need For Combined Data And Analytic Governance

Numbers don't mean anything if people don't understand, or trust, the computation behind them.

Inorganic Growth In Tech: Getting Shredded with Acquisitions
From BLOG@CACM

Inorganic Growth In Tech: Getting Shredded with Acquisitions

Acquisitions happen quite often in the tech industry and are far more complicated to pull off successfully than popping a pill.

5 Best Practices for Cloud-Based Backup and Recovery in 2023
From BLOG@CACM

5 Best Practices for Cloud-Based Backup and Recovery in 2023

These practices help technical professionals ensure their organizations' data is protected and can be recovered quickly.

Data Backup and VM Modernization: How-to Guide
From BLOG@CACM

Data Backup and VM Modernization: How-to Guide

A guide to VM modernization when dealing with data backups.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

Data Governance and the Psychology of Tension Management
From BLOG@CACM

Data Governance and the Psychology of Tension Management

The balancing of the chaos of no data tension and too much tension on data assets is what data governance frameworks and processes attempt to manage.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account