acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The AI Ethicist's Dirty Hands Problem
From Communications of the ACM

The AI Ethicist's Dirty Hands Problem

Attempting to balance sometimes-conflicting interests.

The End of Programming
From Communications of the ACM

The End of Programming

The end of classical computer science is coming, and most of us are dinosaurs waiting for the meteor to hit.

Are Software Updates Useless against Advanced Persistent Threats?
From Communications of the ACM

Are Software Updates Useless against Advanced Persistent Threats?

Considering the conundrum of software updates.

From Quantum Computing to Quantum Communications
From Communications of the ACM

From Quantum Computing to Quantum Communications

Attempting to disentangle mechanical principles.

Building a New Economy
From Communications of the ACM

Building a New Economy: Data, AI, and Web3

How distributed technologies could return more control to users.

Can Universities Combat the 'Wrong Kind of AI'?
From Communications of the ACM

Can Universities Combat the 'Wrong Kind of AI'?

Seeking an artificial intelligence reset.

The Four Horsemen of an Ailing Software Project
From Communications of the ACM

The Four Horsemen of an Ailing Software Project

Don't let the pale rider catch you with an exception.

The Context Problem in Artificial Intelligence
From Communications of the ACM

The Context Problem in Artificial Intelligence

The artificial intelligence design challenge of teaming humans and machines is difficult because machines cannot read the context of use.

Rethinking Silicon Valley
From Communications of the ACM

Rethinking Silicon Valley: Stewart Brand's Lost Journal

Discovering a hidden chapter in computing history.

Mobile-App Privacy Nutrition Labels Missing Key Ingredients for Success
From Communications of the ACM

Mobile-App Privacy Nutrition Labels Missing Key Ingredients for Success

Android and iOS privacy labels confuse developers and end users.

Securing the Company Jewels
From Communications of the ACM

Securing the Company Jewels

GitHub and runbook security.

Data Platforms and Network Effects
From Communications of the ACM

Data Platforms and Network Effects

How data-network effects create opportunities and inflate expectations.

On the Model of Computation: Counterpoint
From Communications of the ACM

On the Model of Computation: Counterpoint: Parallel Programming Wall and Multicore Software Spiral: Denial Hence Crisis

Parallel programming wall and multicore software spiral: Denial hence crisis.

On the Model of Computation: Point
From Communications of the ACM

On the Model of Computation: Point: We Must Extend Our Model of Computation to Account for Cost and Location

We must extend our model of computation to account for cost and location.

Security by Labeling
From Communications of the ACM

Security by Labeling

Protecting and empowering the digital consumer.

Can Neural Networks Learn Better than Human Neurons?
From ACM Opinion

Can Neural Networks Learn Better than Human Neurons?

When AI programmers stop trying to copy the human neuron, neural networks make much better progress.

When Should a Black Box Be Transparent?
From Communications of the ACM

When Should a Black Box Be Transparent?

When is a replacement not a replacement?

An Interview with Dana Scott
From Communications of the ACM

An Interview with Dana Scott

ACM Fellow and A.M. Turing Award recipient Dana Scott reflects on his career.

Transforming Science through Cyberinfrastructure
From Communications of the ACM

Transforming Science through Cyberinfrastructure

NSF's vision for the U.S. cyberinfrastructure ecosystem for science and engineering in the 21st century.

Algorithms with Predictions
From Communications of the ACM

Algorithms with Predictions

Seeking a new approach that goes beyond worst-case analysis.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account