Sign In

Communications of the ACM

Recent Articles



Is It Time to Rethink Women Leadership in Technology?
From ACM Opinion

Is It Time to Rethink Women Leadership in Technology?

Having women in senior leadership positions can positively impact female employee engagement and retention.

Insights for AI from the Human Mind
From Communications of the ACM

Insights for AI from the Human Mind

How the cognitive sciences can inform the quest to build systems with the flexibility of the human mind.

The Immortal Soul of an Old Machine
From Communications of the ACM

The Immortal Soul of an Old Machine

Taking apart a book to figure out how it works.

Cybersecurity Research for the Future
From Communications of the ACM

Cybersecurity Research for the Future

Considering the wide range of technological and societal trade-offs associated with cybersecurity.

How to Best Use Data to Meet Your DE&I Goals
From ACM Opinion

How to Best Use Data to Meet Your DE&I Goals

The collection, analysis, and disclosure of diversity data holds the promise of being a powerful lever for progress.

Federated Learning for Privacy-Preserving AI
From Communications of the ACM

Federated Learning for Privacy-Preserving AI

Engineering and algorithmic framework to ensure data privacy and user confidentiality.

Navigating in Real-Time Environments
From Communications of the ACM

Navigating in Real-Time Environments

An interview with Jim Selman.

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education
From Communications of the ACM

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education

Incorporating equity and inclusion in the effort toward access for everyone.

Operationalizing AI Ethics Principles
From Communications of the ACM

Operationalizing AI Ethics Principles

A better ethics analysis guide for developers.

Where Should Your IT Constraint Be?
From Communications of the ACM

Where Should Your IT Constraint Be?: The Case of the Financial Services Industry

Locating the strategic location of the IT junction constraint.

It Is Time for More Critical CS Education
From Communications of the ACM

It Is Time for More Critical CS Education

By which 'critical' means an intellectual stance of skepticism, centering the consequences, limitations, and unjust impacts of computing in society.

Using Data and Respecting Users
From Communications of the ACM

Using Data and Respecting Users

Three technical and legal approaches that create value from data and foster user trust.

Digital Contact Tracing May Protect Privacy, But It Is Unlikely to Stop the Pandemic
From Communications of the ACM

Digital Contact Tracing May Protect Privacy, But It Is Unlikely to Stop the Pandemic

Considering the potential benefits versus the risks of privacy-enhancing technologies.

Just What Cyber Security Executives Don’t Want to Hear: The Skills Shortage is Worsening
From ACM Opinion

Just What Cyber Security Executives Don’t Want to Hear: The Skills Shortage is Worsening

The cyber security skills gap continues to get worse, according to the latest research.

The Unreasonable Effectiveness of the Julia Programming Language
From ACM Opinion

The Unreasonable Effectiveness of the Julia Programming Language

Fortran has ruled scientific computing, but Julia emerged for large-scale numerical work.

A Holistic View of Future Risks
From Communications of the ACM

A Holistic View of Future Risks

Almost everything is somehow interrelated with everything else—and that should not surprise us.

Sanity vs. Invisible Markings
From Communications of the ACM

Sanity vs. Invisible Markings

Tabs vs. spaces

We Need to Automate the Declaration of <i>Conflicts of Interest</i>
From Communications of the ACM

We Need to Automate the Declaration of Conflicts of Interest

Leveraging existing data sources to improve the declaration and management of authorship conflicts of interest.

Using Computer Programs and Search Problems for Teaching Theory of Computation
From Communications of the ACM

Using Computer Programs and Search Problems for Teaching Theory of Computation

Recognizing the significance of a cornerstone of computer science.

Integrating Management Science Into the HPC Research Ecosystem
From Communications of the ACM

Integrating Management Science Into the HPC Research Ecosystem

How management science benefits from High Performance Computing.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account