acm-header
Sign In

Communications of the ACM

Latest Practice



Cargo Cult AI
From Communications of the ACM

Cargo Cult AI

Is the ability to think scientifically the defining essence of intelligence?

Opportunity Cost and Missed Chances in Optimizing Cybersecurity
From Communications of the ACM

Opportunity Cost and Missed Chances in Optimizing Cybersecurity

The loss of potential gain from other alternatives when one alternative is chosen.

To PiM or Not to PiM
From Communications of the ACM

To PiM or Not to PiM

The case for in-memory inferencing of quantized CNNs at the edge.

Research for Practice: The Fun in Fuzzing
From Communications of the ACM

Research for Practice: The Fun in Fuzzing

The debugging technique comes into its own.

OSS Supply-Chain Security: What Will It Take?
From Communications of the ACM

OSS Supply-Chain Security: What Will It Take?

A discussion with Maya Kaczorowski, Falcon Momot, George Neville-Neil, and Chris McCubbin

Mapping the Privacy Landscape for Central Bank Digital Currencies
From Communications of the ACM

Mapping the Privacy Landscape for Central Bank Digital Currencies

Now is the time to shape what future payment flows will reveal about you.

Split Your Overwhelmed Teams
From Communications of the ACM

Split Your Overwhelmed Teams

Two teams of five is not the same as one team of 10.

From Zero to 100
From Communications of the ACM

From Zero to 100

Demystifying zero trust and its implications on enterprise people, process, and technology.

The Arrival of Zero Trust
From Communications of the ACM

The Arrival of Zero Trust: What Does it Mean?

A discussion of zero-trust enterprise efforts in cybersecurity.

CSRB's Opus One
From Communications of the ACM

CSRB's Opus One

Comments on the Cyber Safety Review Board Log4j Event Report.

Walk a Mile in Their Shoes
From Communications of the ACM

Walk a Mile in Their Shoes

The COVID-19 pandemic through the lens of four tech workers.

Linear Address Spaces
From Communications of the ACM

Linear Address Spaces

Unsafe at any speed.

FPGAs in Client Compute Hardware
From Communications of the ACM

FPGAs in Client Compute Hardware

Despite certain challenges, FPGAs provide security and performance benefits over ASICs.

The Keys to the Kingdom
From Communications of the ACM

The Keys to the Kingdom

A deleted private key, a looming deadline, and a last chance to patch a new static root of trust into the bootloader.

Surveillance Too Cheap to Meter
From Communications of the ACM

Surveillance Too Cheap to Meter

Stopping Big Brother would require an expensive overhaul of the entire system.

The Software Industry Is <i>Still</i> the Problem
From Communications of the ACM

The Software Industry Is Still the Problem

The time is (also) way overdue for IT professional liability.

Lamboozling Attackers
From Communications of the ACM

Lamboozling Attackers: A New Generation of Deception

Software engineering teams can exploit attackers' human nature by building deception environments.

Federated Learning and Privacy
From Communications of the ACM

Federated Learning and Privacy

Building privacy-preserving systems for machine learning and data science on decentralized data.

Static Analysis at GitHub
From Communications of the ACM

Static Analysis at GitHub

An experience report.

Designing UIs for Static-Analysis Tools
From Communications of the ACM

Designing UIs for Static-Analysis Tools

Evaluating tool design guidelines with SWAN.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account