acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.

Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education
From BLOG@CACM

Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education

How can machine learning educators help learners cope with the base rate neglect cognitive bias?

Was Ada Lovelace Actually the First Programmer?
From BLOG@CACM

Was Ada Lovelace Actually the First Programmer?

Historical arguments for and against.

On the Ethics of Writing With AIs
From BLOG@CACM

On the Ethics of Writing With AIs

AI-generated text, even if accepted from an ethical standpoint, raises questions about the provenance of the generated text.

Communing on Computing
From BLOG@CACM

Communing on Computing

 Conferences can renew our professional commitment and inspire thought on problems we face.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account