Sign In

Communications of the ACM

Recent Articles



A Developer's Guide to Machine-Learning Security
From ACM Opinion

A Developer's Guide to Machine-Learning Security

Countering adversarial attacks means understanding the different types as well as the ML weak spots

Can We Handle the Truth about Cybersecurity?
From ACM Opinion

Can We Handle the Truth about Cybersecurity?

Standardizing disclosure rules while ensuring transparency can strengthen our total cybersecurity landscape

Tesla's Dojo Is Impressive, but It Won't Transform Supercomputing
From ACM Opinion

Tesla's Dojo Is Impressive, but It Won't Transform Supercomputing

Dojo's reported performance numbers and niche application place it outside the ranks of true supercomputers

Why Common Sense Is Hard for Computers
From ACM Opinion

Why Common Sense Is Hard for Computers

Recent efforts have recognized machine common sense as a moonshot AI problem of our times

AI Ethics
From Communications of the ACM

AI Ethics: A Call to Faculty

Integrating ethics into artificial intelligence education and development.

Whose Smartphone Is It?
From Communications of the ACM

Whose Smartphone Is It?

Should two private companies have complete control over the world's cellphones?

Back of the Envelope
From Communications of the ACM

Back of the Envelope

Back-of-the-envelope calculations are a powerful professional practice.

Women's Lives in Code
From Communications of the ACM

Women's Lives in Code

Exploring Ellen Ullman's 'Close to the Machine' and AMC's 'Halt and Catch Fire.'

Security Done Right Can Make Smart Cities Wise
From Communications of the ACM

Security Done Right Can Make Smart Cities Wise

Seeking security improvements for smart cities.

Protecting the Global Internet from Technology Cold Wars
From Communications of the ACM

Protecting the Global Internet from Technology Cold Wars

Considering the perceived dangers of the global information flow.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account