Security and Privacy
A Recent Renaissance in Privacy Law
Autonomous Vehicle Safety: Lessons from Aviation
Keeping CALM: When Distributed Consistency Is Easy
Picking Locks with Audio Technology
Closing the ‘Trust Gap’ in Contact Tracing/Exposure Notification Technology
On the Internet of Medical Things
How WWII Was Won, and Why CS Students Feel Unappreciated
Are We Addicted to Technology?
Digital Humans on the Big Screen
TECHNOLOchicas: A Critical Intersectional Approach Shaping the Color of Our Future
Data-Centricity: A Challenge and Opportunity for Computing Education
OMSCS: The Revolution Will Be Digitized
Examining Undergraduate Computer Science Participation in North Carolina
Seeing Light at the End of the Cybersecurity Tunnel
A Tool for Hardening Java Crypto
Towards an Unhackable Quantum Internet
Spectre Attacks: Exploiting Speculative Execution
Technical Perspective: Why ‘Correct’ Computers Can Leak Your Information
Technical Perspective: ASIC Clouds: Specializing the Datacenter
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More