acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Rise and Fall (and Rise) of Datasets
From ACM Opinion

The Rise and Fall (and Rise) of Datasets

Retired and redacted datasets flagged as harmful or biased continue to rear their ugly heads

Why Better AI May Depend on Fake Data
From ACM Opinion

Why Better AI May Depend on Fake Data

Synthetic data can provide AI with a broader education than real-world data, but challenges exist

2021 Was the Year of Monster AI Models
From ACM Opinion

2021 Was the Year of Monster AI Models

GPT-3 kicked off a new trend in AI for bigger and bigger models, but how large will they get?

Artificial Intelligence Across Company Borders
From Communications of the ACM

Artificial Intelligence Across Company Borders

Enabling effective cross-company AI without data disclosure.

Addressing Algorithmic Discrimination
From Communications of the ACM

Addressing Algorithmic Discrimination

Considering the intersection of technical design and civil rights when building and using classification algorithms.

Log4j Vulnerability: Why Your Hot Take on It Is Wrong
From ACM Opinion

Log4j Vulnerability: Why Your Hot Take on It Is Wrong

Log4j vulnerability is too complex to be boiled down to just single cause

The Dream of U.S.-Made Computer Chips
From ACM Opinion

The Dream of U.S.-Made Computer Chips

Before we invest in making more chips on U.S. soil, we should be asking what we're trying to achieve

AWS Has a Sexy New Modernization Play: Mainframes
From ACM Opinion

AWS Has a Sexy New Modernization Play: Mainframes

AWS announced a range of cool services at re:Invent 2021, but none more important than its Mainframe Modernization service

Your Response to AWS Going Down Shouldn't Be Multicloud
From ACM Opinion

Your Response to AWS Going Down Shouldn't Be Multicloud

It's convenient but wrong to assume multicloud will solve your application resilience woes

Securing Kubernetes Environments
From ACM Opinion

Securing Kubernetes Environments

Lack of resources is a massive blocker, so IT leaders need to prioritize

Be Wary of Trusting Algorithms in Volatile Markets
From ACM Opinion

Be Wary of Trusting Algorithms in Volatile Markets

IT leaders can prevent disaster by understanding and articulating the risks of relying on increasingly complex algorithms

Medical Artificial Intelligence
From Communications of the ACM

Medical Artificial Intelligence: The European Legal Perspective

Although the European Commission proposed new legislation for the use of "high-risk artificial intelligence" earlier this year, the existing European fundamental...

Text and Data Mining of In-Copyright Works
From Communications of the ACM

Text and Data Mining of In-Copyright Works: Is It Legal?

How copyright law might be an impediment to text and data mining research.

The Challenges of Regulating Cryptocurrency
From ACM Opinion

The Challenges of Regulating Cryptocurrency

The S.E.C. has yet to set clear rules on cryptocurrencies, leaving the industry guessing. Maybe that's how the agency wants it.

Will the Cloud Eat Your AI?
From ACM Opinion

Will the Cloud Eat Your AI?

Big cloud providers have a lot going for them when it comes to AI, but are they the only game in town?

A Developer's Guide to Machine-Learning Security
From ACM Opinion

A Developer's Guide to Machine-Learning Security

Countering adversarial attacks means understanding the different types as well as the ML weak spots

Who's Building the Foundation Models of the Future?
From ACM Opinion

Who's Building the Foundation Models of the Future?

Curation, auditing, and evaluation of so-called 'foundation models' should not be left to the tech industry.

Where Should Information Go to Be Safe?
From ACM Opinion

Where Should Information Go to Be Safe?

Enterprise data is safest in the cloud and in the 'fog', according to one expert

Tesla's Dojo Is Impressive, but It Won't Transform Supercomputing
From ACM Opinion

Tesla's Dojo Is Impressive, but It Won't Transform Supercomputing

Dojo's reported performance numbers and niche application place it outside the ranks of true supercomputers

Protecting the Global Internet from Technology Cold Wars
From Communications of the ACM

Protecting the Global Internet from Technology Cold Wars

Considering the perceived dangers of the global information flow.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account