acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

The Growing Cost of Deep Learning for Source Code
From Communications of the ACM

The Growing Cost of Deep Learning for Source Code

Attempting to mitigate problems associated with the trend toward massive dataset scaling.

The Long Road Ahead to Transition to Post-Quantum Cryptography
From Communications of the ACM

The Long Road Ahead to Transition to Post-Quantum Cryptography

Anticipating the output of the competition for new cryptographic algorithms.

Securing Kubernetes Environments
From ACM Opinion

Securing Kubernetes Environments

Lack of resources is a massive blocker, so IT leaders need to prioritize

Be Wary of Trusting Algorithms in Volatile Markets
From ACM Opinion

Be Wary of Trusting Algorithms in Volatile Markets

IT leaders can prevent disaster by understanding and articulating the risks of relying on increasingly complex algorithms

The Inherent Limitations of GPT-3
From ACM Opinion

The Inherent Limitations of GPT-3

Why GPT-3 as is will not cost many people their jobs or soon lead to AGI

What Every Engineer and Computer Scientist Should Know
From Communications of the ACM

What Every Engineer and Computer Scientist Should Know: The Biggest Contributor to Happiness

Seeking the fundamental factors instrumental to happiness.

Patent Absurdity
From Communications of the ACM

Patent Absurdity

A case when ignorance is the best policy.

Accelerator-Level Parallelism
From Communications of the ACM

Accelerator-Level Parallelism

Charging computer scientists to develop the science needed to best achieve the performance and cost goals of accelerator-level parallelism hardware and software...

'In Situ' Data Rights
From Communications of the ACM

'In Situ' Data Rights

Improving on data portability.

Computational Thinking for Professionals
From Communications of the ACM

Computational Thinking for Professionals

Professionals practice a form of computational thinking that is significantly more advanced than popular descriptions suggest.

We Are Not Users
From Communications of the ACM

We Are Not Users: Gaining Control Over New Technologies

Seeking a more selective approach to technology usage.

Explicative Programming
From Communications of the ACM

Explicative Programming

Making Computational Thinking relevant to schools.

Shaping Ethical Computing Cultures
From Communications of the ACM

Shaping Ethical Computing Cultures

Lessons from the recent past.

Privacy Engineering Superheroes
From Communications of the ACM

Privacy Engineering Superheroes

Privacy engineers are essential to both preventing and responding to organizational privacy problems.

It's Time to Stop Paying for a VPN
From ACM Opinion

It's Time to Stop Paying for a VPN

Many services meant to protect your Web browsing can no longer be trusted

A Developer's Guide to Machine-Learning Security
From ACM Opinion

A Developer's Guide to Machine-Learning Security

Countering adversarial attacks means understanding the different types as well as the ML weak spots

AI Futures
From Communications of the ACM

AI Futures: Fact and Fantasy

Three books offer varied perspectives on the ascendancy of artificial intelligence.

Competitive Compatibility
From Communications of the ACM

Competitive Compatibility: Let's Fix the Internet, Not the Tech Giants

Seeking to make Big Tech less central to the Internet.

Divide and Conquer
From Communications of the ACM

Divide and Conquer

The use and limits of bisection.

Remaining Connected Throughout Design
From Communications of the ACM

Remaining Connected Throughout Design

Applying the unique experiences of designing technologies for vulnerable communities.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account