The best way to guard against becoming a target of social engineering is to familiarize yourself with the strategies, psychological hooks, and technological means...Alex Vakulov From BLOG@CACM | August 21, 2023 at 03:34 PM
Automated testing in software development significantly diminishes routine work and saves time, allowing programmers to work more effectively.
Yegor Bugayenko From BLOG@CACM | August 4, 2023 at 11:09 PM
With the advent of Large Language Models (LLMs) and tools like GitHub CoPilot, I think we’re a step closer towards a world where software can be created by anyone...Jason Hong From BLOG@CACM | February 17, 2023 at 03:11 PM
Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...Alex Vakulov From BLOG@CACM | August 29, 2022 at 11:09 AM
The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.
Alina Alemaskina and Andrei Sukhov From BLOG@CACM | February 16, 2022 at 12:29 PM
In comic books, most superheroes have a secret identity, usually to protect their friends and family from retribution. However, today’s computer technology would...Jason Hong From BLOG@CACM | January 24, 2022 at 09:12 AM