acm-header
Sign In

Communications of the ACM

Blog at CACM
Log4j and the Thankless High-Risk Task of Managing Software Component Upgrades
Log4j and the Thankless High-Risk Task of Managing Software Component Upgrades
01.19.2022

Managing included versions of third-party software components too often puts developers in no-win situations: damned if they upgrade, damned if …

Essentials of BI Dashboards
Essentials of BI Dashboards
01.18.2022

A well-designed dashboard is everyone's dream come true.

Anti-Racist Computing Education: No More Excuses
Anti-Racist Computing Education: No More Excuses
01.17.2022

On this #MLKDay, a list of resources to help center racial equity and justice in CS classrooms and a reminder that …

View More Blog@CACM

Latest News
UC Engineers Develop Navigation to Avoid Collisions
UC Engineers Develop Navigation to Avoid Collisions
01.19.2022

A new collision-avoidance system brings engineers a step closer to …

Security Flaws Seen in China's Mandatory Olympics App for Athletes
Security Flaws Seen in China's Mandatory Olympics App for Athletes
01.19.2022

Canadian cybersecurity watchdog Citizen Lab has detailed encryption flaws in …

AI Turned a Rembrandt Masterpiece into 5.6 Terabytes of Data
AI Turned a Rembrandt Masterpiece into 5.6 Terabytes of Data
01.19.2022

An ultra-high-resolution image of Rembrandt's "The Night Watch" was constructed …

View More News

Video Highlights
Monetizing Your Personal Data
01.01.2022
Monetizing Your Personal Data

What is your private data worth, to you and to the companies willing to pay you for it?

Converting Laws to Programs
01.01.2022
Converting Laws to Programs

In highly regulated industries, it is critical that laws are translated precisely into code that reflects their intent.

View More Video Highlights

Running Late

The January 2022 CACM magazine was mailed later than usual due to printer/postal delays. The full issue is available online
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account