acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain
From BLOG@CACM

Starlink's Critical Vulnerability, or Elon Musk is Not Worrying in Vain

We analyze the operations of the Starlink Global Satellite System deployed by SpaceX, in terms of its security and resilience.

Fair AI Practices
From BLOG@CACM

Fair AI Practices

A new technology, broadly deployed, raises profound questions about its impact on American society.

A Challenge of Membership
From BLOG@CACM

A Challenge of Membership

How can we solve ACM membership fee payment problems for Russians and Belarussians?

Musk Buying Twitter Is Not About Freedom of Speech
From BLOG@CACM

Musk Buying Twitter Is Not About Freedom of Speech

It's about freedom to control speech.

Superhero Secret Identities Aren't Possible with Today's Computing Technologies
From BLOG@CACM

Superhero Secret Identities Aren't Possible with Today's Computing Technologies

In comic books, most superheroes have a secret identity, usually to protect their friends and family from retribution. However, today’s computer technology would...

Software Stories: Legal Trouble
From BLOG@CACM

Software Stories: Legal Trouble

Legal troubles represent another collection of potential pitfalls where developers often find themselves unprepared. 

Safe AI in Education Needs You
From BLOG@CACM

Safe AI in Education Needs You

Artificial intelligence is coming to your learners and will raise challenging issues that need experts like you. Learn how you can get involved in AI and Educational...

What Should be Done About Facebook?
From BLOG@CACM

What Should be Done About Facebook?

The recent release of the Facebook papers by a whistleblower has confirmed that leaders at the company have long known about problems facilitated by their social...

Patent Protection in Europe
From BLOG@CACM

Patent Protection in Europe

Up to the second half of the 19th century —with the exception of the industrial power Great Britain—the protection of inventions was inadequate and strongly disputed...

Competitions, Not Confrontation
From BLOG@CACM

Competitions, Not Confrontation

The ACM as an organizer of international cooperation.  

Auditing AI and Autonomous Systems; Building an Infrastructure of Trust
From BLOG@CACM

Auditing AI and Autonomous Systems; Building an Infrastructure of Trust

How do we build trust? How can we systematically assure trust in our systems? How would auditing AI and autonomous systems contribute to this goal? Explaining...

From Solar Sunrise to SolarWinds
From BLOG@CACM

From Solar Sunrise to SolarWinds

The hack of critical departments of the U.S. government—and of many leading corporations—should come as no surprise.

Closing the 'Trust Gap' in Contact Tracing/Exposure Notification Technology
From BLOG@CACM

Closing the 'Trust Gap' in Contact Tracing/Exposure Notification Technology

The digitization of contact tracing presents an array of challenges.

The Software that Led to the Lockdown
From BLOG@CACM

The Software that Led to the Lockdown

One of the key drivers for the decision to lockdown the U.K. in late March 2020 was a computational epidemiological model developed at Imperial College, London....

Voting, Coding, and the Code
From BLOG@CACM

Voting, Coding, and the Code

Voting is more than counting.

Is the Trolley Problem ­Useful for Studying Autonomous Vehicles?
From BLOG@CACM

Is the Trolley Problem ­Useful for Studying Autonomous Vehicles?

Does the trolley problem offer any useful insights for autonomous vehicles, in terms of design of or public policy around these systems? Here are several reasons...

In (Virtual) Defense of Democracy
From BLOG@CACM

In (Virtual) Defense of Democracy

There are two ways to proceed with political discourse in cyberspace, if the trolls are to be tamed.

Why is Privacy So Hard?
From BLOG@CACM

Why is Privacy So Hard?

Why is privacy so hard? Why is it, after so much negative press about it, are we still being constantly tracked on the web and on our smartphones? Why is it, after...

The Ethical Responsibilities of the Student or End-­User Programmer
From BLOG@CACM

The Ethical Responsibilities of the Student or End-­User Programmer

If a student's program goes awry, who is responsible? How do we protect society and encourage people to learn about code? 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account