acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

New Research Vindicates Fodor and Pylyshyn: No Explainable AI Without 'Structured Semantics'
From BLOG@CACM

New Research Vindicates Fodor and Pylyshyn: No Explainable AI Without 'Structured Semantics'

In this short article, we generalize recent research results that clearly make the point that "there can be no explanation without semantics."

Heinz Rutishauser, a Forgotten Swiss Pioneer
From BLOG@CACM

Heinz Rutishauser, a Forgotten Swiss Pioneer

A look at the little-known Rutishauser, who created "automatic programming" and was one of the "authoritative fathers" of the Algol programming language.

Not Your Grandmother's Textbook Exercise
From BLOG@CACM

Not Your Grandmother's Textbook Exercise

Sarcasm, where you least expected it.

Lessons Learned Writing For BLOG@CACM
From BLOG@CACM

Lessons Learned Writing For BLOG@CACM

...and how to become a better technical writer In the process.

Opportunities of Data Science Education
From BLOG@CACM

Opportunities of Data Science Education

Considering the six new and exciting opportunities that data science presents.

Which Were the Most Influential Early Computers?
From BLOG@CACM

Which Were the Most Influential Early Computers?

Considering early machines that had the greatest influence on the development of program-controlled computers.

DevSecOps: Resolving Disagreements Between Developers and Security Teams
From BLOG@CACM

DevSecOps: Resolving Disagreements Between Developers and Security Teams

Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...

A Challenge of Membership
From BLOG@CACM

A Challenge of Membership

How can we solve ACM membership fee payment problems for Russians and Belarussians?

The Legacy of Barry Boehm
From BLOG@CACM

The Legacy of Barry Boehm

One of the founders of software engineering as we know it.

The Continual Re-Creation Of The Key-Value Datastore
From BLOG@CACM

The Continual Re-Creation Of The Key-Value Datastore

The evolution of single machine key-value stores.

A History of One Brute-Force Attack
From BLOG@CACM

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.

Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education
From BLOG@CACM

Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education

How can machine learning educators help learners cope with the base rate neglect cognitive bias?

Was Ada Lovelace Actually the First Programmer?
From BLOG@CACM

Was Ada Lovelace Actually the First Programmer?

Historical arguments for and against.

On the Ethics of Writing With AIs
From BLOG@CACM

On the Ethics of Writing With AIs

AI-generated text, even if accepted from an ethical standpoint, raises questions about the provenance of the generated text.

Communing on Computing
From BLOG@CACM

Communing on Computing

 Conferences can renew our professional commitment and inspire thought on problems we face.

The Base-Rate Neglect Cognitive Bias in Data Science
From BLOG@CACM

The Base-Rate Neglect Cognitive Bias in Data Science

Using Bayes' Theorem, the correct answer to both the medical diagnosis problem and to the lion classification question, can be calculated.

Why Are There So Many Programming Languages?
From BLOG@CACM

Why Are There So Many Programming Languages?

Most languages differ less in what they make possible, and more in terms of what they make easy. 

Where is the Cradle of the Computer?
From BLOG@CACM

Where is the Cradle of the Computer?

The digital computer of today arose in the first half of the 1940s independently in three different countries: Germany, the U.K. and the U.S.

AI as (an Ersatz) Natural Science?
From BLOG@CACM

AI as (an Ersatz) Natural Science?

The emergence of large learned models is changing the nature of artificial intelligence research in fundamental ways.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account