Security and Privacy
Portable Device Fears Show Power of Social Development
Manipulating Word Representations, and Preparing Students For Coding Jobs?
What Can Agile Methods Bring to High-Integrity Software Development?
Will Quantum Computers Surpass Encryption?
Take Two Aspirin and Call Me in the Morning
When Does Law Enforcement’s Demand to Read Your Data Become a Demand to Read Your Mind?
Security in High-Performance Computing Environments
Toward Algorithmic Transparency and Accountability
Divination By Program Committee
Turing Laureates Celebrate Award’s 50th Anniversary
Trust and Distrust in Online Fact-Checking Services
Technical Perspective: A Gloomy Look at the Integrity of Hardware
Exploiting the Analog Properties of Digital Circuits For Malicious Hardware
Charles P. ‘Chuck’ Thacker: 1943-2017
Is the U.S. Education System Ready For CS For All?
The Natural Science of Computing
Turing’s Pre-War Analog Computers: The Fatherhood of the Modern Computer Revisited
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More