Software Challenges for the Changing Storage Landscape
Security and Privacy
Technical Perspective: Making Sleep Tracking More User Friendly
LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study
Technical Perspective: Backdoor Engineering
Where Did I Leave My Keys?: Lessons from the Juniper Dual EC Incident
Assessing the Impact of Cryptography on Internet Privacy
The Internet in the 21st Century
Can We Use AI for Global Good?
Transient Electronics Take Shape
The Business of Quantum Computing
A Pedagogic Cybersecurity Framework
Building the Universal Archive of Source Code
Are CS Conferences (Too) Closed Communities?
The Secret Formula for Choosing the Right Next Role
The Productivity Paradox in Health Information Technology
Formally Verified Software in the Real World
Reaping the Benefits of a Diverse Background
Financial Services Firms Battle Cyberthreats
.S. Election System Security Still Vexing
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More