acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

How Did Scientists Succumb to Aunt Edna? The Dangers of a Superintelligent AI is Fiction
From BLOG@CACM

How Did Scientists Succumb to Aunt Edna? The Dangers of a Superintelligent AI is Fiction

Speaking of the existential threat of AI is science fiction, and bad science fiction for that matter because it is not based on anything we know about science,...

A Year Embedded in the Crypto-NFT Space
From BLOG@CACM

A Year Embedded in the Crypto-NFT Space

From digital ownership to artistic communities.

Artificial Intelligence Without Real Intelligence?
From BLOG@CACM

Artificial Intelligence Without Real Intelligence?

Do the programs understand what they write?

What Google Should Really Be Worried About
From BLOG@CACM

What Google Should Really Be Worried About

How sewers of lies could spell the end of Web search.

The Need For Combined Data And Analytic Governance
From BLOG@CACM

The Need For Combined Data And Analytic Governance

Numbers don't mean anything if people don't understand, or trust, the computation behind them.

ChatGPT in Computer Science Education
From BLOG@CACM

ChatGPT in Computer Science Education

Asked "How will ChatGPT influence computer science education?" teachers barely addressed the threats it poses.

Evaluating Research Results for Practical Applications
From BLOG@CACM

Evaluating Research Results for Practical Applications

The role of the application of research results in assessing the achievements of scientists.

Is ChatGPT Really a 'Code Red' for Google Search?
From BLOG@CACM

Is ChatGPT Really a 'Code Red' for Google Search?

Maybe not.

Logical Beats Sequential
From BLOG@CACM

Logical Beats Sequential

Often, "we do this and then we do that" is just a lazy way of stating "to do that, we must have achieved this."

The Continual Re-Creation Of The Key-Value Datastore
From BLOG@CACM

The Continual Re-Creation Of The Key-Value Datastore

The evolution of single machine key-value stores.

Communing on Computing
From BLOG@CACM

Communing on Computing

 Conferences can renew our professional commitment and inspire thought on problems we face.

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid
From BLOG@CACM

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid

Avoiding these common, easily preventable blunders will help you maximize success in your career journey.

Data Anonymization Using the Random Sum Method
From BLOG@CACM

Data Anonymization Using the Random Sum Method

The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.

Cryptocurs Don't Asportate
From BLOG@CACM

Cryptocurs Don't Asportate

Cryptocurrency on a blockchain cannot be stolen -- it's true.

We Are Camille
From BLOG@CACM

We Are Camille

Who is Camille Noûs, who has contributed to hundreds of papers on Google Scholar?

New Areas for Application of Self-Organizing Routing
From BLOG@CACM

New Areas for Application of Self-Organizing Routing

To organize the productive work of multiprocessor chips, it is necessary to establish an efficient distribution of computational processes between computational...

Understanding NoSQL Database Types: Document
From BLOG@CACM

Understanding NoSQL Database Types: Document

Document databases are particularly useful in app development.

Clean Code Isn't Enough; It Must Be Crystal Clear, Too
From BLOG@CACM

Clean Code Isn't Enough; It Must Be Crystal Clear, Too

Writing clean code is a great start, but for programmers who really want to master their craft, you have to go further. You need to write clear code that other...

Not So Good After All? Don't Let 'Altruism' Kill Your Company
From BLOG@CACM

Not So Good After All? Don't Let 'Altruism' Kill Your Company

Altruism is often heralded as a panacea for management challenges, but it could actually be a death sentence for your team and projects. Here's why. 

Lazy Developers Are the Best Developers
From BLOG@CACM

Lazy Developers Are the Best Developers

Lazy developers stick to the project scope while forcing the project team to understand and fix their own code and issues.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account