acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Competitive Compatibility
From Communications of the ACM

Competitive Compatibility: Let's Fix the Internet, Not the Tech Giants

Seeking to make Big Tech less central to the Internet.

Divide and Conquer
From Communications of the ACM

Divide and Conquer

The use and limits of bisection.

Remaining Connected Throughout Design
From Communications of the ACM

Remaining Connected Throughout Design

Applying the unique experiences of designing technologies for vulnerable communities.

AI Ethics
From Communications of the ACM

AI Ethics: A Call to Faculty

Integrating ethics into artificial intelligence education and development.

Whose Smartphone Is It?
From Communications of the ACM

Whose Smartphone Is It?

Should two private companies have complete control over the world's cellphones?

Testing Educational Digital Games
From Communications of the ACM

Testing Educational Digital Games

Diversifying usability studies utilizing rapid application development.

Back of the Envelope
From Communications of the ACM

Back of the Envelope

Back-of-the-envelope calculations are a powerful professional practice.

Women's Lives in Code
From Communications of the ACM

Women's Lives in Code

Exploring Ellen Ullman's 'Close to the Machine' and AMC's 'Halt and Catch Fire.'

Security Done Right Can Make Smart Cities Wise
From Communications of the ACM

Security Done Right Can Make Smart Cities Wise

Seeking security improvements for smart cities.

How to Do Machine Learning without an Army of Data Scientists
From ACM Opinion

How to Do Machine Learning without an Army of Data Scientists

Machine learning is still harder than it needs to be, but there are tools that can help

Low-Code Development Could Boost AI Adoption
From ACM Opinion

Low-Code Development Could Boost AI Adoption

Artificial intelligence is hard, but low-code options might make it much easier

What Do Developers Want and Need from Secure Coding Training?
From ACM Opinion

What Do Developers Want and Need from Secure Coding Training?

There is still confusion about the role developers play in software security

Governing AI Safety through Independent Audits
From ACM Opinion

Governing AI Safety through Independent Audits

Governance of highly automated systems is critical to garner widespread public trust

A European Union Approach to Regulating Big Tech
From Communications of the ACM

A European Union Approach to Regulating Big Tech

Considering a new regulatory proposal for addressing digital market competition concerns.

What Does Saying That 'Programming Is Hard' Really Say, and About Whom?
From Communications of the ACM

What Does Saying That 'Programming Is Hard' Really Say, and About Whom?

Shifting the focus from the perceived difficulty of learning programming to making programming more universally accessible.

In Praise of the Disassembler
From Communications of the ACM

In Praise of the Disassembler

There is much to be learned from the lower-level details of hardware.

Responsible AI
From Communications of the ACM

Responsible AI: Bridging From Ethics to Practice

Recommendations for increasing the benefits of artificial intelligence technologies.

Science Needs to Engage With Society
From Communications of the ACM

Science Needs to Engage With Society: Some Lessons From COVID-19

Recent experiences toward communicating science to the general public.

The Domestic Computer Science Graduate Students Are There, We Just Need to Recruit Them
From Communications of the ACM

The Domestic Computer Science Graduate Students Are There, We Just Need to Recruit Them

Proven practices to recruit domestic computer science graduate students.

How Do We Stop the Supercomputing Carbon Crisis?
From ACM Opinion

How Do We Stop the Supercomputing Carbon Crisis?

Efficiency measures are struggling to keep pace with, let alone make headway on, the accelerating demands of modern supercomputers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account