There are technological reasons why BlueSky is experiencing sharp growth in users and activity.
Systems and Networking
Aides or staffers registered official email addresses and passwords on vulnerable third-party sites, putting those credentials at risk.
HammingMesh: A Network Topology for Large-Scale Deep Learning
HammingMesh is optimized specifically for ML workloads and their communication patterns.
Technical Perspective: Mirror, Mirror on the Wall, What Is the Best Topology of Them All?
Combining torus topologies’ cost-effectiveness and switched topologies’ performance into a novel network topology.
Transactions and Serverless are Made for Each Other
Serverless cloud platforms should be used to deploy stateful applications.
Confidential Computing or Cryptographic Computing?
Trade-offs between secure computation via cryptography and hardware enclaves.
Laser communications technology demonstrated aboard NASA's Psyche spacecraft could make the 140-million-mile distance from Earth to Mars feel much closer.
You Don’t Know Jack about Bandwidth
Fixes to IP networking help ISPs and other companies make better use of their bandwidth.
How Laser Communications Are Improving Satellites
Demonstrations indicate that laser communications could deliver significantly higher bandwidth than RF, with reduced size, weight, and power requirements on satellites.
Leveraging SaaS and Cloud Solutions for Enhanced Business Agility
Companies that invest in SaaS and cloud solutions improve operations and position themselves for long-term success.
mCaptcha: Replacing Captchas with Rate Limiters to Improve Security and Accessibility
An overview of mCaptcha, a variable-difficulty-based proof-of-work captcha system that addresses the security, usability, and privacy issues with other captchas.
Elevating Security with Arm CCA
RME introduces a new kind of confidential compute environment called a realm.
A Brief History of Blockchain Interoperability
Four trends shaping today's interconnected blockchain ecosystems.
Cloud computing poses challenges for systems that require confidentiality.
Many public agencies already have tracking and communications technologies embedded in their emergency and transit vehicles.
Nobel Laureates Consider the State of Quantum Computing
Most experts are reluctant to predict when a large-scale quantum computer will be commercialized.
Cybersecurity in Industrial IoT: Protecting Critical Infrastructure
Today's IIoT environments demand sophisticated, multi-layered security strategies.
Global Auto Dealer Management Systems Hacked
Lawsuits claim the attacks exposed consumers' personal information and stopped dealerships' sales, financing, servicing, and payroll operations.
How Today’s Recommender Systems Use Machine Learning to Cater to Your Every Whim
Today’s recommender systems, driven by sophisticated models, are able to increasingly personalize your online experience.
Security Challenges of Intent-Based Networking
Intent-based networking allows operators to describe the high-level intent of what they want a network to do.
Technical Perspective: Tracing the Network Traffic Fingerprinting Techniques of OpenVPN
"OpenVPN is Open to VPN Fingerprinting," by Diwen Xue et al., investigates network traffic fingerprinting of a very popular privacy technique—OpenVPN.
OpenVPN Is Open to VPN Fingerprinting
Technical Perspective: Creating the Internet of Biological and Bio-Inspired Things
"mSAIL: Milligram-Scale Multi-modal Sensor Platform for Monarch Butterfly Migration Tracking," by Inhee Lee et al., describes a critical milestone in the mobile system community’s efforts toward creating the Internet of biological things.
mSAIL: Milligram-Scale Multi-Modal Sensor Platform for Monarch Butterfly Migration Tracking
We propose a wireless sensing platform, mSAIL, specifically designed for a monarch butterfly migration study based on previously developed custom-designed ICs.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More