acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Cybersecurity Mistakes to Avoid at All Costs
From BLOG@CACM

Cybersecurity Mistakes to Avoid at All Costs

Preventing unauthorized access or misuse of confidential data.

The Urgency of the Technological, Geopolitical, and Sustainability Races
From BLOG@CACM

The Urgency of the Technological, Geopolitical, and Sustainability Races

The HiPEAC Vision 2023.

Why Data Security Is An Issue For Business Phone Systems In 2023
From BLOG@CACM

Why Data Security Is An Issue For Business Phone Systems In 2023

A discussion of the most common phone scams, how they work, and how to protect yourself from them.

AI's Jurassic Park Moment
From BLOG@CACM

AI's Jurassic Park Moment

New systems like chatGPT are enormously entertaining, and even mind-boggling, but also unreliable, and potentially dangerous.

Why Is It Hard to Define Data Science?
From BLOG@CACM

Why Is It Hard to Define Data Science?

Data science can be described as a science, as a research paradigm, as a research method, as a discipline, as a workflow, and as a profession.

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain
From BLOG@CACM

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain

We analyze the operations of the Starlink Global Satellite System deployed by SpaceX, in terms of its security and resilience.

Fair AI Practices
From BLOG@CACM

Fair AI Practices

A new technology, broadly deployed, raises profound questions about its impact on American society.

A Challenge of Membership
From BLOG@CACM

A Challenge of Membership

How can we solve ACM membership fee payment problems for Russians and Belarussians?

Musk Buying Twitter Is Not About Freedom of Speech
From BLOG@CACM

Musk Buying Twitter Is Not About Freedom of Speech

It's about freedom to control speech.

Superhero Secret Identities Aren't Possible with Today's Computing Technologies
From BLOG@CACM

Superhero Secret Identities Aren't Possible with Today's Computing Technologies

In comic books, most superheroes have a secret identity, usually to protect their friends and family from retribution. However, today’s computer technology would...

Software Stories: Legal Trouble
From BLOG@CACM

Software Stories: Legal Trouble

Legal troubles represent another collection of potential pitfalls where developers often find themselves unprepared. 

Safe AI in Education Needs You
From BLOG@CACM

Safe AI in Education Needs You

Artificial intelligence is coming to your learners and will raise challenging issues that need experts like you. Learn how you can get involved in AI and Educational...

What Should be Done About Facebook?
From BLOG@CACM

What Should be Done About Facebook?

The recent release of the Facebook papers by a whistleblower has confirmed that leaders at the company have long known about problems facilitated by their social...

Patent Protection in Europe
From BLOG@CACM

Patent Protection in Europe

Up to the second half of the 19th century —with the exception of the industrial power Great Britain—the protection of inventions was inadequate and strongly disputed...

Competitions, Not Confrontation
From BLOG@CACM

Competitions, Not Confrontation

The ACM as an organizer of international cooperation.  

Auditing AI and Autonomous Systems; Building an Infrastructure of Trust
From BLOG@CACM

Auditing AI and Autonomous Systems; Building an Infrastructure of Trust

How do we build trust? How can we systematically assure trust in our systems? How would auditing AI and autonomous systems contribute to this goal? Explaining...

From Solar Sunrise to SolarWinds
From BLOG@CACM

From Solar Sunrise to SolarWinds

The hack of critical departments of the U.S. government—and of many leading corporations—should come as no surprise.

Closing the 'Trust Gap' in Contact Tracing/Exposure Notification Technology
From BLOG@CACM

Closing the 'Trust Gap' in Contact Tracing/Exposure Notification Technology

The digitization of contact tracing presents an array of challenges.

The Software that Led to the Lockdown
From BLOG@CACM

The Software that Led to the Lockdown

One of the key drivers for the decision to lockdown the U.K. in late March 2020 was a computational epidemiological model developed at Imperial College, London....

Voting, Coding, and the Code
From BLOG@CACM

Voting, Coding, and the Code

Voting is more than counting.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account