acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain
From BLOG@CACM

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain

We analyze the operations of the Starlink Global Satellite System deployed by SpaceX, in terms of its security and resilience.

Choosing a DAST Solution: What to Pay Attention To
From BLOG@CACM

Choosing a DAST Solution: What to Pay Attention To

The tool characteristics and parameters you need to pay attention to, and the product types currently available on the market.

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
From BLOG@CACM

Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?

A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.

Data Governance and the Psychology of Tension Management
From BLOG@CACM

Data Governance and the Psychology of Tension Management

The balancing of the chaos of no data tension and too much tension on data assets is what data governance frameworks and processes attempt to manage.

Three Risks Facing Higher Education
From BLOG@CACM

Three Risks Facing Higher Education

The implications of COVID-19 for risk management in higher education.

Reflections on the AI Bill of Rights Blueprint
From BLOG@CACM

Reflections on the AI Bill of Rights Blueprint

The White House Office of Science and Technology Policy has released a "Blueprint for an AI Bill of Rights." I reflect on this milestone document in the context...

In Pursuit of an International Computation Center in Europe
From BLOG@CACM

In Pursuit of an International Computation Center in Europe

The story of the UNESCO International Computation Center.

Fair AI Practices
From BLOG@CACM

Fair AI Practices

A new technology, broadly deployed, raises profound questions about its impact on American society.

Where to Look:  CS Ethics Research
From BLOG@CACM

Where to Look: CS Ethics Research

 A select range of publications, peer-reviewed or close, provide sources for student research.

Four Conversations About Human-Centric AI
From BLOG@CACM

Four Conversations About Human-Centric AI

I discuss the different conversations, their limits, and what we really need to be talking about.

New Research Vindicates Fodor and Pylyshyn: No Explainable AI Without 'Structured Semantics'
From BLOG@CACM

New Research Vindicates Fodor and Pylyshyn: No Explainable AI Without 'Structured Semantics'

In this short article, we generalize recent research results that clearly make the point that "there can be no explanation without semantics."

Heinz Rutishauser, a Forgotten Swiss Pioneer
From BLOG@CACM

Heinz Rutishauser, a Forgotten Swiss Pioneer

A look at the little-known Rutishauser, who created "automatic programming" and was one of the "authoritative fathers" of the Algol programming language.

Not Your Grandmother's Textbook Exercise
From BLOG@CACM

Not Your Grandmother's Textbook Exercise

Sarcasm, where you least expected it.

Lessons Learned Writing For BLOG@CACM
From BLOG@CACM

Lessons Learned Writing For BLOG@CACM

...and how to become a better technical writer In the process.

Opportunities of Data Science Education
From BLOG@CACM

Opportunities of Data Science Education

Considering the six new and exciting opportunities that data science presents.

Which Were the Most Influential Early Computers?
From BLOG@CACM

Which Were the Most Influential Early Computers?

Considering early machines that had the greatest influence on the development of program-controlled computers.

DevSecOps: Resolving Disagreements Between Developers and Security Teams
From BLOG@CACM

DevSecOps: Resolving Disagreements Between Developers and Security Teams

Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...

A Challenge of Membership
From BLOG@CACM

A Challenge of Membership

How can we solve ACM membership fee payment problems for Russians and Belarussians?

The Legacy of Barry Boehm
From BLOG@CACM

The Legacy of Barry Boehm

One of the founders of software engineering as we know it.

The Continual Re-Creation Of The Key-Value Datastore
From BLOG@CACM

The Continual Re-Creation Of The Key-Value Datastore

The evolution of single machine key-value stores.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account