acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Securing Kubernetes Environments
From ACM Opinion

Securing Kubernetes Environments

Lack of resources is a massive blocker, so IT leaders need to prioritize

Four AI Trends for 2022
From ACM Opinion

Four AI Trends for 2022

Look for improvements to neural networks, strategic ethics, hiring practices, and even gastronomy

Keeping AI in Healthcare in Check
From ACM Opinion

Keeping AI in Healthcare in Check

Experts discuss the need to prevent AI bias in healthcare

Computational Thinking for Professionals
From Communications of the ACM

Computational Thinking for Professionals

Professionals practice a form of computational thinking that is significantly more advanced than popular descriptions suggest.

An Insider's View of 'Algorithmic Warfare'
From ACM Opinion

An Insider's View of 'Algorithmic Warfare'

Artificial intelligence will change the nature of war, says a former U.S. deputy secretary of defense.

AI Needs to Prevent Cyberattacks, Not Just Detect Them
From ACM Opinion

AI Needs to Prevent Cyberattacks, Not Just Detect Them

AI should be enabling faster, automated, more ubiquitous prevention of cyberattacks

AI and the Intelligence Community: The Tangled Web of Budget and Acquisition
From ACM Opinion

AI and the Intelligence Community: The Tangled Web of Budget and Acquisition

The intelligence community still faces basic hurdles as it moves to transition and integrate AI at speed and scale

Social Media Cos. Help African Governments Abuse 'Disinformation Laws'
From ACM Opinion

Social Media Cos. Help African Governments Abuse 'Disinformation Laws'

Social media platforms alternate between ignoring disinformation and launching broad crackdowns on user speech

Medical Artificial Intelligence
From Communications of the ACM

Medical Artificial Intelligence: The European Legal Perspective

Although the European Commission proposed new legislation for the use of "high-risk artificial intelligence" earlier this year, the existing European fundamental...

Explicative Programming
From Communications of the ACM

Explicative Programming

Making Computational Thinking relevant to schools.

Text and Data Mining of In-Copyright Works
From Communications of the ACM

Text and Data Mining of In-Copyright Works: Is It Legal?

How copyright law might be an impediment to text and data mining research.

Pentagon Wants AI to Predict Events Before They Occur
From ACM Opinion

Pentagon Wants AI to Predict Events Before They Occur

AI-enabled platforms are expected to offer strategic warning of adversarial actions prior to any irreversible moves having been made

The FDA Should Better Regulate Medical Algorithms
From ACM Opinion

The FDA Should Better Regulate Medical Algorithms

Most do not require the agency's approval, and those that do often don't require clinical trial

Instagram Isn't the Only Social Media That's Hurting Girls
From ACM Opinion

Instagram Isn't the Only Social Media That's Hurting Girls

Researchers and reporters have been documenting social media's harmful effects on kids prior to whistleblower Frances Haugen's testimony

The DOJ Wants Companies to Admit Their Cybersecurity Problems
From ACM Opinion

The DOJ Wants Companies to Admit Their Cybersecurity Problems

Agency plans to use Civil War-era "Lincoln Law" to enforce cybersecurity disclosure

The Challenges of Regulating Cryptocurrency
From ACM Opinion

The Challenges of Regulating Cryptocurrency

The S.E.C. has yet to set clear rules on cryptocurrencies, leaving the industry guessing. Maybe that's how the agency wants it.

Facebook Can't Be Saved
From ACM Opinion

Facebook Can't Be Saved

Whistleblower Frances Haugen told senators that Facebook shouldn't be broken up, but its problems are a direct consequence of its size.

It's Time to Stop Paying for a VPN
From ACM Opinion

It's Time to Stop Paying for a VPN

Many services meant to protect your Web browsing can no longer be trusted

America Is Being Held for Ransom, and It Needs to Fight Back
From ACM Opinion

America Is Being Held for Ransom, and It Needs to Fight Back

A comprehensive anti-ransomware strategy must make it tougher for criminal groups and their sponsors to carry out attacks

A Developer's Guide to Machine-Learning Security
From ACM Opinion

A Developer's Guide to Machine-Learning Security

Countering adversarial attacks means understanding the different types as well as the ML weak spots
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account