acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Back of the Envelope
From Communications of the ACM

Back of the Envelope

Back-of-the-envelope calculations are a powerful professional practice.

Women's Lives in Code
From Communications of the ACM

Women's Lives in Code

Exploring Ellen Ullman's 'Close to the Machine' and AMC's 'Halt and Catch Fire.'

Security Done Right Can Make Smart Cities Wise
From Communications of the ACM

Security Done Right Can Make Smart Cities Wise

Seeking security improvements for smart cities.

Low-Code Development Could Boost AI Adoption
From ACM Opinion

Low-Code Development Could Boost AI Adoption

Artificial intelligence is hard, but low-code options might make it much easier

Let the Linux Kernel Rust
From ACM Opinion

Let the Linux Kernel Rust

Rust is creeping into the Linux kernel, which could mean a very important step forward in terms of security.

What Do Developers Want and Need from Secure Coding Training?
From ACM Opinion

What Do Developers Want and Need from Secure Coding Training?

There is still confusion about the role developers play in software security

But Is the Code (Re)usable?
From ACM Opinion

But Is the Code (Re)usable?

It is crucial to guarantee the reproducibility of reported results, but don't forget to make research artifacts reusable for the scientific community

How to Create Successful Developer Products
From ACM Opinion

How to Create Successful Developer Products

Interested in building software for developers? Follow these three design principles from Akita Software CEO Jean Yang.

Governing AI Safety through Independent Audits
From ACM Opinion

Governing AI Safety through Independent Audits

Governance of highly automated systems is critical to garner widespread public trust

A European Union Approach to Regulating Big Tech
From Communications of the ACM

A European Union Approach to Regulating Big Tech

Considering a new regulatory proposal for addressing digital market competition concerns.

In Praise of the Disassembler
From Communications of the ACM

In Praise of the Disassembler

There is much to be learned from the lower-level details of hardware.

Responsible AI
From Communications of the ACM

Responsible AI: Bridging From Ethics to Practice

Recommendations for increasing the benefits of artificial intelligence technologies.

Science Needs to Engage With Society
From Communications of the ACM

Science Needs to Engage With Society: Some Lessons From COVID-19

Recent experiences toward communicating science to the general public.

Kubernetes Magic Is in Enterprise Standardization, Not App Portability
From ACM Opinion

Kubernetes Magic Is in Enterprise Standardization, Not App Portability

Kubernetes isn't going to magically make your applications portable, but it just might give you something even better.

What OpenAI and GitHub's AI Pair Programmer Means for the Software Industry
From ACM Opinion

What OpenAI and GitHub's AI Pair Programmer Means for the Software Industry

AI-powered code generator provides some interesting hints about the business of large language models and the future of the software industry.

 The Next Critical Talent Shortage Won't Be Fortran
From ACM Opinion

The Next Critical Talent Shortage Won't Be Fortran

To understand where talent shortages might arise, look at critical infrastructure.

Lessons From the Loo
From Communications of the ACM

Lessons From the Loo

Illustrating privacy concepts with potty talk.

Responsible Computing During COVID-19 and Beyond
From Communications of the ACM

Responsible Computing During COVID-19 and Beyond

Navigating the ethical and societal impacts of technologies.

The Limits of Differential Privacy (and Its Misuse in Data Release and Machine Learning)
From Communications of the ACM

The Limits of Differential Privacy (and Its Misuse in Data Release and Machine Learning)

Differential privacy is not a silver bullet for all privacy problems.

Collusion Rings Threaten the Integrity of Computer Science Research
From Communications of the ACM

Collusion Rings Threaten the Integrity of Computer Science Research

Experiences discovering attempts to subvert the peer-review process.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account