acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Ethics and Equity in AI for Collaborative Learning
From BLOG@CACM

Ethics and Equity in AI for Collaborative Learning

In designing collaborative learning, design AI features using realistic examples of students’ learning; support teachers' awareness; develop students' sense of...

The Interdisciplinarity of Data Science from the Perspective of the MERge Model
From BLOG@CACM

The Interdisciplinarity of Data Science from the Perspective of the MERge Model

Where should management be located in the data science Venn diagram?

Face It, Self-Driving Cars Still Haven't Earned Their Stripes
From BLOG@CACM

Face It, Self-Driving Cars Still Haven't Earned Their Stripes

Edge cases remain a serious, unsolved problem, $100 billion later.

Duped No More: Navigating the Maze of Social Engineering Schemes
From BLOG@CACM

Duped No More: Navigating the Maze of Social Engineering Schemes

The best way to guard against becoming a target of social engineering is to familiarize yourself with the strategies, psychological hooks, and technological means...

Machine Learning: the Road to Artificial Intelligence?
From BLOG@CACM

Machine Learning: the Road to Artificial Intelligence?

In the mid-1990s, data-driven, statistical, and empirical methods have taken the field of artificial intelligence (AI) by storm. In the last two decades, machine...

Federated Learning: How Private Is It Really?
From BLOG@CACM

Federated Learning: How Private Is It Really?

Just when it looks like Federated Learning is able to keep local data private, out comes a study to deflate us.

ChatGPT in Computer Science Education: Freshmen's Perceptions
From BLOG@CACM

ChatGPT in Computer Science Education: Freshmen's Perceptions

Exploring freshmen's conceptions of the impact of ChatGPT on computer science education.

Stop Judging AI Using Human Exams
From BLOG@CACM

Stop Judging AI Using Human Exams

Computer scientists should inform the public that human tests are not a valid way to judge the quality of an AI model, nor a good way to compare AI models to human...

Bigger than a Blackbox
From BLOG@CACM

Bigger than a Blackbox

When we ask how deep learning works, are we asking which node represents the answer to "animal, vegetable, or mineral?"

Is Bard Better than ChatGPT?
From BLOG@CACM

Is Bard Better than ChatGPT?

A test should show whether Bard is more powerful than ChattGPT or AI-powered Microsoft Bing.

The Hadoop Ecosystem's Continued Impact
From BLOG@CACM

The Hadoop Ecosystem's Continued Impact

Hadoop owed much to the Google GFS, MapReduce, and BigTable papers, but it was also a response to a broader technology community need. 

What Does AI-Powered Microsoft Bing Say?
From BLOG@CACM

What Does AI-Powered Microsoft Bing Say?

The answers from the AI-powered Microsoft Bing are often useless.

Pedagogical Paths Through Ethics
From BLOG@CACM

Pedagogical Paths Through Ethics

Concepts of ethics can be integrated into lessons that reflect contemporary concerns and involve student knowledge of modern technology.

How Did Scientists Succumb to Aunt Edna? The Dangers of a Superintelligent AI is Fiction
From BLOG@CACM

How Did Scientists Succumb to Aunt Edna? The Dangers of a Superintelligent AI is Fiction

Speaking of the existential threat of AI is science fiction, and bad science fiction for that matter because it is not based on anything we know about science,...

What Can the FATE Community Learn from the Successes and Failures in Privacy?
From BLOG@CACM

What Can the FATE Community Learn from the Successes and Failures in Privacy?

There are many similarities between FATE (Fairness, Accountability, Transparency, Ethics) and privacy, and I believe that there are a lot of lessons that the FATE...

A Year Embedded in the Crypto-NFT Space
From BLOG@CACM

A Year Embedded in the Crypto-NFT Space

From digital ownership to artistic communities.

Teaching Data Science Research Methods to Human Resources Practitioners: Part Two
From BLOG@CACM

Teaching Data Science Research Methods to Human Resources Practitioners: Part Two

"When I heard we will be learning Python, I became anxious."

Cybersecurity Mistakes to Avoid at All Costs
From BLOG@CACM

Cybersecurity Mistakes to Avoid at All Costs

Preventing unauthorized access or misuse of confidential data.

Twiddler: Configurability for Me, but Not for Thee
From BLOG@CACM

Twiddler: Configurability for Me, but Not for Thee

Online platform businesses have a distinctly more abusive and sinister character than brick-and-mortar retail chains.

The Urgency of the Technological, Geopolitical, and Sustainability Races
From BLOG@CACM

The Urgency of the Technological, Geopolitical, and Sustainability Races

The HiPEAC Vision 2023.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account