acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

 The Next Critical Talent Shortage Won't Be Fortran
From ACM Opinion

The Next Critical Talent Shortage Won't Be Fortran

To understand where talent shortages might arise, look at critical infrastructure.

Reimplementing Software Interfaces Is Fair Use
From Communications of the ACM

Reimplementing Software Interfaces Is Fair Use

A multifactored rationale for denying Oracle's claim against Google.

Lessons From the Loo
From Communications of the ACM

Lessons From the Loo

Illustrating privacy concepts with potty talk.

Responsible Computing During COVID-19 and Beyond
From Communications of the ACM

Responsible Computing During COVID-19 and Beyond

Navigating the ethical and societal impacts of technologies.

The Limits of Differential Privacy (and Its Misuse in Data Release and Machine Learning)
From Communications of the ACM

The Limits of Differential Privacy (and Its Misuse in Data Release and Machine Learning)

Differential privacy is not a silver bullet for all privacy problems.

Google's AI Approach to Microchips Is Welcome—but Needs Care
From ACM Opinion

Google's AI Approach to Microchips Is Welcome—but Needs Care

Artificial intelligence can help the electronics industry to speed up chip design. But the gains must be shared equitably.

What Makes Quantum Computing So Hard to Explain?
From ACM Opinion

What Makes Quantum Computing So Hard to Explain?

To understand what quantum computers can do—and what they can’t—avoid falling for overly simple explanations.

Collusion Rings Threaten the Integrity of Computer Science Research
From Communications of the ACM

Collusion Rings Threaten the Integrity of Computer Science Research

Experiences discovering attempts to subvert the peer-review process.

Aversion to Versions
From Communications of the ACM

Aversion to Versions

Code needs to run anywhere as long as the necessary dependencies can be resolved.

The Risks of Election Believability (or Lack Thereof)
From Communications of the ACM

The Risks of Election Believability (or Lack Thereof)

With 90% of the 2020 U.S. general election ballot contents verifiable by paper, why do only 65% of voters trust the results?

Defining a Role for AI Ethics in National Security
From ACM Opinion

Defining a Role for AI Ethics in National Security

Mariarosaria Taddeo, an associate professor and senior research fellow at the Oxford Internet Institute and Dstl Ethics Fellow at the Alan Turing Institute, discusses...

Trustworthy Scientific Computing
From Communications of the ACM

Trustworthy Scientific Computing

Addressing the trust issues underlying the current limits on data sharing.

Software Professionals, Malpractice Law, and Codes of Ethics
From Communications of the ACM

Software Professionals, Malpractice Law, and Codes of Ethics

In pursuit of professional status for computing professionals.

Understanding Law and the Rule of Law
From Communications of the ACM

Understanding Law and the Rule of Law: A Plea to Augment CS Curricula

Why law matters for computer scientists and other folk.

The 10 Best Practices for Remote Software Engineering
From Communications of the ACM

The 10 Best Practices for Remote Software Engineering

Focusing on the human element of remote software engineer productivity.

Let's Be Honest
From Communications of the ACM

Let's Be Honest

Seeking to rectify the two mutually exclusive ways of comparing computational power — encoding and simulation.

Tech in the Post-Pandemic World
From ACM Opinion

Tech in the Post-Pandemic World

Assessing its future, both the bad and the good.

Building a Multilingual Wikipedia
From Communications of the ACM

Building a Multilingual Wikipedia

Seeking to develop a multilingual Wikipedia where content can be shared among language editions.

Roots of 'Program' Revisited
From Communications of the ACM

Roots of 'Program' Revisited

Considering the fundamental nature and malleability of programming.

When Hackers Were Heroes
From Communications of the ACM

When Hackers Were Heroes

The complex legacy of Steven Levy's obsessive programmers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account