Sign In

Communications of the ACM

Recent Articles



Imagine a World Without Apps
From ACM Opinion

Imagine a World Without Apps

Video games are inching away from apps. Maybe every other industry can, too.

Federated Learning for Privacy-Preserving AI
From Communications of the ACM

Federated Learning for Privacy-Preserving AI

Engineering and algorithmic framework to ensure data privacy and user confidentiality.

Silicon Politics
From Communications of the ACM

Silicon Politics

Tracing the widening path between Silicon Valley and Washington, D.C.

Removing Kode
From Communications of the ACM

Removing Kode

Dead functions and dead features.

Navigating in Real-Time Environments
From Communications of the ACM

Navigating in Real-Time Environments

An interview with Jim Selman.

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education
From Communications of the ACM

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education

Incorporating equity and inclusion in the effort toward access for everyone.

Why Is North Korea So Good at Cybercrime?
From ACM Opinion

Why Is North Korea So Good at Cybercrime?

North Korea has moved quickly to expand its cyber capabilities, and Kim Jong Un himself has reportedly equated the importance of developing cyber capabilities to...

Your Computer Isn't Yours
From ACM Opinion

Your Computer Isn't Yours

It's here. The world that Richard Stallman predicted in 1997. The one Cory Doctorow also warned us about. Did you notice?

Quantum Computing Pioneer Warns of Complacency over Internet Security
From ACM Opinion

Quantum Computing Pioneer Warns of Complacency over Internet Security

Nature talks to Peter Shor 25 years after he showed how to make quantum computations feasible — and how they could endanger our data.

Reason-Checking Fake News
From Communications of the ACM

Reason-Checking Fake News

Using argument technology to strengthen critical literacy skills for assessing media reports.

Where Should Your IT Constraint Be?
From Communications of the ACM

Where Should Your IT Constraint Be?: The Case of the Financial Services Industry

Locating the strategic location of the IT junction constraint.

It Is Time for More Critical CS Education
From Communications of the ACM

It Is Time for More Critical CS Education

By which 'critical' means an intellectual stance of skepticism, centering the consequences, limitations, and unjust impacts of computing in society.

Using Data and Respecting Users
From Communications of the ACM

Using Data and Respecting Users

Three technical and legal approaches that create value from data and foster user trust.

Copyright's Online Service Providers Safe Harbors Under Siege
From Communications of the ACM

Copyright's Online Service Providers Safe Harbors Under Siege

Reviewing the most significant changes recommended in the recently released U.S. Copyright Office Section 512 Study.

Digital Contact Tracing May Protect Privacy, But It Is Unlikely to Stop the Pandemic
From Communications of the ACM

Digital Contact Tracing May Protect Privacy, But It Is Unlikely to Stop the Pandemic

Considering the potential benefits versus the risks of privacy-enhancing technologies.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account