Scientists are using machine learning techniques such as classifiers to identify units of language and hope deep neural networks will help them figure out what animals might be talking about.
Data and Information
The Cyber Vulnerabilities Lurking in CRM Systems
Technology alone isn’t to blame for CRM vulnerabilities; users themselves often create the weakest links.
Smash: Flexible, Fast, and Resource-Efficient Placement and Lookup of Distributed Storage
Smash achieves full placement flexibility, fast storage operations, fast recovery from node dynamics, and lower DRAM cost compared to existing hash-based solutions.
Technical Perspective: Where Is My Data?
Smash provides full placement flexibility in assigning data to any machine while reducing memory overhead costs compared to current approaches used in practice.
Upstart Puzzles: Selective Sponges
This puzzle abstracts the microRNAs sponges problem to its core algorithmic issues.
TMO: Transparent Memory Offloading in Datacenters
TMO addresses questions of how much memory to offload and what memory to offload.
Deleting X: Why SIGDOC Left the Platform
Why would an organization choose to remain on a social media platform that is the very antithesis of what the organization embodies and hopes to promote?
AI Teams Contend With Synthetic Data’s Jekyll/Hyde Roles
Experiments show a degradation in foundation-model performance once synthetic training data becomes too prevalent.
Smart Home IoT and Its Impact on Commercial Real Estate
The vulnerability of LLMs to hallucination, prompt injection, and jailbreaks poses a significant but surmountable challenge to their widespread adoption.
A New Era for Retail Computing
AI and cloud technology can predict customer needs, help manage stock, and provide real-time insights.
Carbon-aware scheduling tools analyze and optimize the trade-offs among carbon emissions, cost, and performance.
The Vibe Coding Imperative for Product Managers
Vibe coding is transforming the role of product managers, transforming how we prototype, discover insights, and strategize.
How to Boost Research Documentation with Speech Processing Tools
Text-to-speech and speech-to-text tools give scholars more time for critical thinking and drawing thoughtful conclusions.
Why Business Intelligence Alone Won’t Cut It Anymore
Business Intelligence is backward-looking, and has limitations in the modern enterprise.
The Power and Potential of Zero-Knowledge Proofs
ZKPs are a means of proving a statement while retaining privacy and ensuring information security.
Harnessing AI, Behavioral Data Science for Smarter Consumer Platforms
Clock Bait: Why The Moon Needs Its Own Time Zone
Clocks tick faster on the Moon, which over time could lead to timing errors that are too large to accept for safe lunar navigation or autonomous navigation.
An Algorithm for a Better Bookshelf
Laziness is only one of two desirable properties for a bookshelf algorithm. The second is the ability to proactively respond to an adversary’s strategy.
Weighted ballots, abstained votes, and how to make your favored candidate win.
Advancements in Weather Prediction
The amount and quality of topographical, land use, land cover, coastline, and other data feeding forecasting models are leading to better predictions.
Homomorphic Technologies Could Process Still-Encrypted Data
Fully homomorphic encryption could stave off the security threats quantum computers pose to current encryption techniques.
Space-based datacenters would reduce the need for water, electricity, and other earth-based resources.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More