acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Log4j Vulnerability: Why Your Hot Take on It Is Wrong
From ACM Opinion

Log4j Vulnerability: Why Your Hot Take on It Is Wrong

Log4j vulnerability is too complex to be boiled down to just single cause

The Dream of U.S.-Made Computer Chips
From ACM Opinion

The Dream of U.S.-Made Computer Chips

Before we invest in making more chips on U.S. soil, we should be asking what we're trying to achieve

AWS Has a Sexy New Modernization Play: Mainframes
From ACM Opinion

AWS Has a Sexy New Modernization Play: Mainframes

AWS announced a range of cool services at re:Invent 2021, but none more important than its Mainframe Modernization service

Your Response to AWS Going Down Shouldn't Be Multicloud
From ACM Opinion

Your Response to AWS Going Down Shouldn't Be Multicloud

It's convenient but wrong to assume multicloud will solve your application resilience woes

Securing Kubernetes Environments
From ACM Opinion

Securing Kubernetes Environments

Lack of resources is a massive blocker, so IT leaders need to prioritize

Be Wary of Trusting Algorithms in Volatile Markets
From ACM Opinion

Be Wary of Trusting Algorithms in Volatile Markets

IT leaders can prevent disaster by understanding and articulating the risks of relying on increasingly complex algorithms

Medical Artificial Intelligence
From Communications of the ACM

Medical Artificial Intelligence: The European Legal Perspective

Although the European Commission proposed new legislation for the use of "high-risk artificial intelligence" earlier this year, the existing European fundamental...

Text and Data Mining of In-Copyright Works
From Communications of the ACM

Text and Data Mining of In-Copyright Works: Is It Legal?

How copyright law might be an impediment to text and data mining research.

The Challenges of Regulating Cryptocurrency
From ACM Opinion

The Challenges of Regulating Cryptocurrency

The S.E.C. has yet to set clear rules on cryptocurrencies, leaving the industry guessing. Maybe that's how the agency wants it.

Will the Cloud Eat Your AI?
From ACM Opinion

Will the Cloud Eat Your AI?

Big cloud providers have a lot going for them when it comes to AI, but are they the only game in town?

A Developer's Guide to Machine-Learning Security
From ACM Opinion

A Developer's Guide to Machine-Learning Security

Countering adversarial attacks means understanding the different types as well as the ML weak spots

Who's Building the Foundation Models of the Future?
From ACM Opinion

Who's Building the Foundation Models of the Future?

Curation, auditing, and evaluation of so-called 'foundation models' should not be left to the tech industry.

Where Should Information Go to Be Safe?
From ACM Opinion

Where Should Information Go to Be Safe?

Enterprise data is safest in the cloud and in the 'fog', according to one expert

Tesla's Dojo Is Impressive, but It Won't Transform Supercomputing
From ACM Opinion

Tesla's Dojo Is Impressive, but It Won't Transform Supercomputing

Dojo's reported performance numbers and niche application place it outside the ranks of true supercomputers

Protecting the Global Internet from Technology Cold Wars
From Communications of the ACM

Protecting the Global Internet from Technology Cold Wars

Considering the perceived dangers of the global information flow.

How Big Data Carried Graph Theory into New Dimensions
From ACM Opinion

How Big Data Carried Graph Theory into New Dimensions

Researchers are turning to the mathematics of higher-order interactions to better model complex connections in data

Now That Machines Can Learn, Can They Unlearn?
From ACM Opinion

Now That Machines Can Learn, Can They Unlearn?

Researchers are testing whether they can remove sensitive data without retraining AI systems from scratch

Infrastructure Bill's Cryptocurrency Surveillance Provision Is Privacy Disaster
From ACM Opinion

Infrastructure Bill's Cryptocurrency Surveillance Provision Is Privacy Disaster

Mandate to collect customer data would force companies related to cryptocurrency to surveil users

The Privacy Battle that Apple Isn't Fighting
From ACM Opinion

The Privacy Battle that Apple Isn't Fighting

California has begun enforcing a browser-level privacy setting, but you still can't find that option in Safari or iOS

Computational Sustainability Meets Materials Science
From ACM Opinion

Computational Sustainability Meets Materials Science

Exploiting synergies between the disciplines advances both fields and can help establish a sustainable future.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account