Architecture and Hardware
Fulfilling the Growing Power Requirements of AI Datacenters
Nuclear energy checks many of the boxes sought for a modern power source.
Predicting the Unpredictable: The AI Outlook
Uncertainties about competition, legislation, and sustainability counterbalance the thrilling potential of AI.
Cyber Trust Mark to Distinguish Secure Smart Home Devices
The U.S. Cyber Trust Mark program is a mechanism for providers of wireless smart home devices to test and certify the security of their products.
Many Faces of Ad Hoc Transactions
The flexibility of ad hoc transactions is a double-edged sword, providing potential performance benefits but also increasing the risk of correctness issues.
Technical Perspective: Ad Hoc Transactions: What They Are and Why We Should Care
The paper by Tang et al. addresses important questions about ad hoc transactions.
Digital Twins Promise Personalized Medical Care
An accurate digital twin could monitor a person’s health and serve as a testbed for various therapies as needed.
You Need Much Less Memory than Time
An upcoming STOC conference paper reports a huge near-quadratic improvement that will go down as a true classic complexity theorem.
Researchers are tuning in on ways to turn down the volume with fabrics and materials that buffer, baffle, and block sound waves.
Willow and the Countdown to Quantum Breaches
The ever-increasing speed of quantum computers bodes both well and poorly for cybersecurity.
Guide Dogs are Expensive and Scarce. Could Robots Do Their Job?
Governmental research agencies in the U.S., the U.K., and in China are all funding research into assistive robots to help the sight-impaired.
Reasons to Raise the Cyber-Shields
Putting the Smarts into Robot Bodies
Delving into the key tradeoffs of building foundation models for embodied AI systems.
A Pragmatic Overview of Wi-Fi Security Risks
Communication between each device on a Wi-Fi network and its router should be secured with strong encryption because the signals can literally be snatched out of the air.
Will AI Companion Bots be Beneficial for Teens?
AI-enabled apps provide companionship and hold realistic conversations, but there's also a darker side.
Disrupting Networks: Decentralization and the Fediverse
AI Agents: Automation is Not Enough
AI Agents adapt to changes, learn from feedback, and can act autonomously or in collaboration with humans or other agents.
Infostealers have been siphoning sensitive data for more than 16 years, since the first banking Trojan stole usernames and passwords.
An expected shortfall in skilled workers poses a risk to the U.S.'s ability to compete in the global semiconductor manufacturing and chip design industry, the SIA says.
Meta’s Hyperscale Infrastructure: Overview and Insights
A concise, high-level overview of Meta’s hyperscale infrastructure, with key insights from its development.
Technical Perspective: Shortening the Path to Designing Efficient Graph Algorithms
A new way of designing efficient graph algorithms that will go significantly beyond shortest paths.
Archeologists Dig Deep into the Past with AI
Assorted tech tools are helping researchers reconstruct excavation sites and reassemble artifacts algorithmically.
Brain Implants Give People Back What They Lost
Researchers aim to have paralyzed patients use thoughts to control a prosthetic hand while physical sensations from the hand provide feedback.
The Hidden Risks of URL-Shortening in Scientific Review
Reviewers, authors, and editors all have a role to play in protecting fairness and objectivity in the blind review process.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More