Security and Privacy
Why People Post Benevolent and Malicious Comments Online
Hidden In-Game Intelligence in NBA Players’ Tweets
Inductive Programming Meets the Real World
Technical Perspective: Treating Networks Like Programs
Software Dataplane Verification
How Men Can Help Women in CS; Winning ‘Computing’s Nobel Prize’
Software Patents Are Falling Down
Companies Proactively Seek Out Internal Threats
Electronic Health Records and Patient Safety
Programming in K-12 Science Classrooms
Court Reaffirms Ftc Authority to Prosecute Cybersecurity Breaches
What Can Be Done About Gender Diversity in Computing?: A Lot!
The Third Heidelberg Laureate Forum
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More