acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

An Emergent Legal Right to Repair Electronic Devices
From Communications of the ACM

An Emergent Legal Right to Repair Electronic Devices

Parsing the fine print on repair tolerances.

Is This the Beginning of the End of the Internet?
From ACM Opinion

Is This the Beginning of the End of the Internet?

How a single Texas ruling could change the Web forever.

A Common-Sense Test for AI Could Lead to Smarter Machines
From ACM Opinion

A Common-Sense Test for AI Could Lead to Smarter Machines

Injecting common sense into AI could mean big things for humans.

Securing the Company Jewels
From Communications of the ACM

Securing the Company Jewels

GitHub and runbook security.

Data Platforms and Network Effects
From Communications of the ACM

Data Platforms and Network Effects

How data-network effects create opportunities and inflate expectations.

How AI Could Accidentally Extinguish Humankind
From ACM Opinion

How AI Could Accidentally Extinguish Humankind

Humanity is not prepared for artificial superintelligence right now.

On the Model of Computation: Counterpoint
From Communications of the ACM

On the Model of Computation: Counterpoint: Parallel Programming Wall and Multicore Software Spiral: Denial Hence Crisis

Parallel programming wall and multicore software spiral: Denial hence crisis.

On the Model of Computation: Point
From Communications of the ACM

On the Model of Computation: Point: We Must Extend Our Model of Computation to Account for Cost and Location

We must extend our model of computation to account for cost and location.

Security by Labeling
From Communications of the ACM

Security by Labeling

Protecting and empowering the digital consumer.

These Are Not the Apes You Are Looking For
From Communications of the ACM

These Are Not the Apes You Are Looking For

Considering copyright licensing issues involving non-fungible tokens to manage creative works.

Data Breaches Involve the Same Stories Again and Again
From ACM Opinion

Data Breaches Involve the Same Stories Again and Again

Only when we learn from them can we make headway in stopping the cycle.

When Should a Black Box Be Transparent?
From Communications of the ACM

When Should a Black Box Be Transparent?

When is a replacement not a replacement?

An Interview with Dana Scott
From Communications of the ACM

An Interview with Dana Scott

ACM Fellow and A.M. Turing Award recipient Dana Scott reflects on his career.

Transforming Science through Cyberinfrastructure
From Communications of the ACM

Transforming Science through Cyberinfrastructure

NSF's vision for the U.S. cyberinfrastructure ecosystem for science and engineering in the 21st century.

The Latin of Software Code Is Thriving
From ACM Opinion

The Latin of Software Code Is Thriving

Next time you laugh at musty old tech, remember that new technologies are often built on it.

Algorithms with Predictions
From Communications of the ACM

Algorithms with Predictions

Seeking a new approach that goes beyond worst-case analysis.

Cookie Monster
From Communications of the ACM

Cookie Monster

Inscrutable cookie banners torment users while failing to inform consent.

The Future of Information Work
From Communications of the ACM

The Future of Information Work

Considering the recent effects of remote work on network structure.

Apple's Challenge to Virtualization Software
From Communications of the ACM

Apple's Challenge to Virtualization Software

Is it okay for security researchers to virtualize software to look for vulnerabilities?

Why Robots Need to See
From ACM Opinion

Why Robots Need to See

Cameras and vision-based perception will increasingly serve as the technological underpinning for mobile robots going forward.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account