acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Be Wary of Trusting Algorithms in Volatile Markets
From ACM Opinion

Be Wary of Trusting Algorithms in Volatile Markets

IT leaders can prevent disaster by understanding and articulating the risks of relying on increasingly complex algorithms

The Inherent Limitations of GPT-3
From ACM Opinion

The Inherent Limitations of GPT-3

Why GPT-3 as is will not cost many people their jobs or soon lead to AGI

What Every Engineer and Computer Scientist Should Know
From Communications of the ACM

What Every Engineer and Computer Scientist Should Know: The Biggest Contributor to Happiness

Seeking the fundamental factors instrumental to happiness.

Patent Absurdity
From Communications of the ACM

Patent Absurdity

A case when ignorance is the best policy.

Accelerator-Level Parallelism
From Communications of the ACM

Accelerator-Level Parallelism

Charging computer scientists to develop the science needed to best achieve the performance and cost goals of accelerator-level parallelism hardware and software...

'In Situ' Data Rights
From Communications of the ACM

'In Situ' Data Rights

Improving on data portability.

Computational Thinking for Professionals
From Communications of the ACM

Computational Thinking for Professionals

Professionals practice a form of computational thinking that is significantly more advanced than popular descriptions suggest.

We Are Not Users
From Communications of the ACM

We Are Not Users: Gaining Control Over New Technologies

Seeking a more selective approach to technology usage.

Explicative Programming
From Communications of the ACM

Explicative Programming

Making Computational Thinking relevant to schools.

Shaping Ethical Computing Cultures
From Communications of the ACM

Shaping Ethical Computing Cultures

Lessons from the recent past.

Privacy Engineering Superheroes
From Communications of the ACM

Privacy Engineering Superheroes

Privacy engineers are essential to both preventing and responding to organizational privacy problems.

It's Time to Stop Paying for a VPN
From ACM Opinion

It's Time to Stop Paying for a VPN

Many services meant to protect your Web browsing can no longer be trusted

A Developer's Guide to Machine-Learning Security
From ACM Opinion

A Developer's Guide to Machine-Learning Security

Countering adversarial attacks means understanding the different types as well as the ML weak spots

AI Futures
From Communications of the ACM

AI Futures: Fact and Fantasy

Three books offer varied perspectives on the ascendancy of artificial intelligence.

Competitive Compatibility
From Communications of the ACM

Competitive Compatibility: Let's Fix the Internet, Not the Tech Giants

Seeking to make Big Tech less central to the Internet.

Divide and Conquer
From Communications of the ACM

Divide and Conquer

The use and limits of bisection.

Remaining Connected Throughout Design
From Communications of the ACM

Remaining Connected Throughout Design

Applying the unique experiences of designing technologies for vulnerable communities.

AI Ethics
From Communications of the ACM

AI Ethics: A Call to Faculty

Integrating ethics into artificial intelligence education and development.

Whose Smartphone Is It?
From Communications of the ACM

Whose Smartphone Is It?

Should two private companies have complete control over the world's cellphones?

Testing Educational Digital Games
From Communications of the ACM

Testing Educational Digital Games

Diversifying usability studies utilizing rapid application development.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account