More than half of surveyed organizations have a person who’s in charge of AI or orchestrate related initiatives.
Fort Knox Your Data: A Guide to Access Controls
Regular audits and continuous monitoring are critical for identifying and addressing potential security vulnerabilities.
Training Neural Networks to Grok
A paper by Victor Reis and Thomas Rothvoss proved a new upper bound on the time required to solve for any integer program.
More Top Articles
What We're Reading
Opinion
BLOG@CACM
Explore the latest issue
Table of ContentsVideo
Introducing the distinction between a programmer and a coder made the idea of automatic coding more appealing.
An Analysis of the Math Requirements of 199 CS BS/BA Degrees at 158 U.S. Universities
While most CS departments in the U.S. require calculus, there is no consensus as to where in the degree program it should be placed.
Welcome: 2024 Regional Special Section, Latin America
When it comes to computer science, Latin American researchers have made significant contributions to multiple areas.
Fort Knox Your Data: A Guide to Access Controls
Regular audits and continuous monitoring are critical for identifying and addressing potential security vulnerabilities.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More