acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Why Is It Hard to Define Data Science?
From BLOG@CACM

Why Is It Hard to Define Data Science?

Data science can be described as a science, as a research paradigm, as a research method, as a discipline, as a workflow, and as a profession.

The Legacy of Peer-to-Peer Systems
From BLOG@CACM

The Legacy of Peer-to-Peer Systems

What happened to peer-to-peer as a technological concept?      

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?
From BLOG@CACM

What Does Meta AI's Diplomacy-Winning Cicero Mean for AI?

Hint: It's not all about scaling.

Stack Ranking: Organizational Cancer
From BLOG@CACM

Stack Ranking: Organizational Cancer

If only the best are hired, why isn't everybody great?

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain
From BLOG@CACM

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain

We analyze the operations of the Starlink Global Satellite System deployed by SpaceX, in terms of its security and resilience.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

Data Governance and the Psychology of Tension Management
From BLOG@CACM

Data Governance and the Psychology of Tension Management

The balancing of the chaos of no data tension and too much tension on data assets is what data governance frameworks and processes attempt to manage.

In Pursuit of an International Computation Center in Europe
From BLOG@CACM

In Pursuit of an International Computation Center in Europe

The story of the UNESCO International Computation Center.

DevSecOps: Resolving Disagreements Between Developers and Security Teams
From BLOG@CACM

DevSecOps: Resolving Disagreements Between Developers and Security Teams

Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...

A Challenge of Membership
From BLOG@CACM

A Challenge of Membership

How can we solve ACM membership fee payment problems for Russians and Belarussians?

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.

Why Are There So Many Programming Languages?
From BLOG@CACM

Why Are There So Many Programming Languages?

Most languages differ less in what they make possible, and more in terms of what they make easy. 

Enterprise Metrics and Optimization
From BLOG@CACM

Enterprise Metrics and Optimization

Metrics are critical; without them, you are flying blind.  But be careful what you try to optimize, because you might just get it.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account