acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Why Businesses Must Untether Deep Learning
From BLOG@CACM

Why Businesses Must Untether Deep Learning

Deep learning only took a few years to make the leap from another theoretical piece of future-tech to a very real tool that's already making an impact on the business...

GPT-4's Successes, and GPT-4's Failures
From BLOG@CACM

GPT-4's Successes, and GPT-4's Failures

How GPT-4 fits into the larger tapestry of the quest for artificial general intelligence.

Teaching Data Science Research Methods to Human Resources Practitioners: Part Two
From BLOG@CACM

Teaching Data Science Research Methods to Human Resources Practitioners: Part Two

"When I heard we will be learning Python, I became anxious."

Cybersecurity Mistakes to Avoid at All Costs
From BLOG@CACM

Cybersecurity Mistakes to Avoid at All Costs

Preventing unauthorized access or misuse of confidential data.

Twiddler: Configurability for Me, but Not for Thee
From BLOG@CACM

Twiddler: Configurability for Me, but Not for Thee

Online platform businesses have a distinctly more abusive and sinister character than brick-and-mortar retail chains.

The Urgency of the Technological, Geopolitical, and Sustainability Races
From BLOG@CACM

The Urgency of the Technological, Geopolitical, and Sustainability Races

The HiPEAC Vision 2023.

Enabling AI Projects In An Enterprise
From BLOG@CACM

Enabling AI Projects In An Enterprise

Identifying the development behaviors that have the highest chance of success for artificial intelligence efforts.

Serendipity: When Research in One Area Leads to a Positive Result in Another
From BLOG@CACM

Serendipity: When Research in One Area Leads to a Positive Result in Another

A problem of the extremely optimal family of circulant graphs: when research in one scientific field gives an unexpected result in another.

Teaching Data Science Research Methods to Human Resources Practitioners: Part One
From BLOG@CACM

Teaching Data Science Research Methods to Human Resources Practitioners: Part One

The challenge was to teach data science concepts to students who have gaps in their computer science background and are experts in human resources management and...

How Not to Test GPT-3
From BLOG@CACM

How Not to Test GPT-3

Why doing psychology on large language models is harder than you might think.

Why *is* Bing So Reckless?
From BLOG@CACM

Why *is* Bing So Reckless?

And how did some prominent journalists utterly miss this initially?

Using GitHub CoPilot is Like Having a Superpower
From BLOG@CACM

Using GitHub CoPilot is Like Having a Superpower

With the advent of Large Language Models (LLMs) and tools like GitHub CoPilot, I think we’re a step closer towards a world where software can be created by anyone...

ChatGPT for Provost!
From BLOG@CACM

ChatGPT for Provost!

Three to five years from now, we won’t be talking about what ChatGPT can or can’t do, but we could be talking about how ChatGPT brought us all together, and the...

What Google Should Really Be Worried About
From BLOG@CACM

What Google Should Really Be Worried About

How sewers of lies could spell the end of Web search.

What is an Author?
From BLOG@CACM

What is an Author?

In a single-author text (such as this one), we can assume a lot about the process. In the multi-author case, all these assumptions start to break down.

Inside the Heart of ChatGPT's Darkness
From BLOG@CACM

Inside the Heart of ChatGPT's Darkness

A Nightmare on LLM Street.

The Need For Combined Data And Analytic Governance
From BLOG@CACM

The Need For Combined Data And Analytic Governance

Numbers don't mean anything if people don't understand, or trust, the computation behind them.

Why Data Security Is An Issue For Business Phone Systems In 2023
From BLOG@CACM

Why Data Security Is An Issue For Business Phone Systems In 2023

A discussion of the most common phone scams, how they work, and how to protect yourself from them.

ChatGPT in Computer Science Education
From BLOG@CACM

ChatGPT in Computer Science Education

Asked "How will ChatGPT influence computer science education?" teachers barely addressed the threats it poses.

Evaluating Research Results for Practical Applications
From BLOG@CACM

Evaluating Research Results for Practical Applications

The role of the application of research results in assessing the achievements of scientists.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account