acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Early Computers in Continental Europe
From BLOG@CACM

Early Computers in Continental Europe

About the Bark (binär automatisk relä-kalkylator, binary automatic relay computer) and Besk (binär elektronisk sekvens kalkylator, binary electronic sequential...

Will Free Open Access Publication Become a Mass Phenomenon?
From BLOG@CACM

Will Free Open Access Publication Become a Mass Phenomenon?

In this blog post, I would like to go over the value of different publication platforms from the point of view of an ordinary scientific researcher.

Bad Reasons to Reject Good Papers, and Vice Versa
From BLOG@CACM

Bad Reasons to Reject Good Papers, and Vice Versa

(or, am I Reviewer #2? Should I be?)

Logical Beats Sequential
From BLOG@CACM

Logical Beats Sequential

Often, "we do this and then we do that" is just a lazy way of stating "to do that, we must have achieved this."

Why Is It Hard to Define Data Science?
From BLOG@CACM

Why Is It Hard to Define Data Science?

Data science can be described as a science, as a research paradigm, as a research method, as a discipline, as a workflow, and as a profession.

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?
From BLOG@CACM

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?

Hint: It's not all about scaling.

Data Backup and VM Modernization: How-to Guide
From BLOG@CACM

Data Backup and VM Modernization: How-to Guide

A guide to VM modernization when dealing with data backups.

Stack Ranking: Organizational Cancer
From BLOG@CACM

Stack Ranking: Organizational Cancer

If only the best are hired, why isn't everybody great?

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain
From BLOG@CACM

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain

We analyze the operations of the Starlink Global Satellite System deployed by SpaceX, in terms of its security and resilience.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

Three Risks Facing Higher Education
From BLOG@CACM

Three Risks Facing Higher Education

The implications of COVID-19 for risk management in higher education.

Reflections on the AI Bill of Rights Blueprint
From BLOG@CACM

Reflections on the AI Bill of Rights Blueprint

The White House Office of Science and Technology Policy has released a "Blueprint for an AI Bill of Rights." I reflect on this milestone document in the context...

In Pursuit of an International Computation Center in Europe
From BLOG@CACM

In Pursuit of an International Computation Center in Europe

The story of the UNESCO International Computation Center.

Four Conversations About Human-Centric AI
From BLOG@CACM

Four Conversations About Human-Centric AI

I discuss the different conversations, their limits, and what we really need to be talking about.

New Research Vindicates Fodor and Pylyshyn: No Explainable AI Without 'Structured Semantics'
From BLOG@CACM

New Research Vindicates Fodor and Pylyshyn: No Explainable AI Without 'Structured Semantics'

In this short article, we generalize recent research results that clearly make the point that "there can be no explanation without semantics."

Heinz Rutishauser, a Forgotten Swiss Pioneer
From BLOG@CACM

Heinz Rutishauser, a Forgotten Swiss Pioneer

A look at the little-known Rutishauser, who created "automatic programming" and was one of the "authoritative fathers" of the Algol programming language.

Opportunities of Data Science Education
From BLOG@CACM

Opportunities of Data Science Education

Considering the six new and exciting opportunities that data science presents.

Which Were the Most Influential Early Computers?
From BLOG@CACM

Which Were the Most Influential Early Computers?

Considering early machines that had the greatest influence on the development of program-controlled computers.

A Challenge of Membership
From BLOG@CACM

A Challenge of Membership

How can we solve ACM membership fee payment problems for Russians and Belarussians?

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account