Sign In

Communications of the ACM

Recent Articles



Federated Learning for Privacy-Preserving AI
From Communications of the ACM

Federated Learning for Privacy-Preserving AI

Engineering and algorithmic framework to ensure data privacy and user confidentiality.

Silicon Politics
From Communications of the ACM

Silicon Politics

Tracing the widening path between Silicon Valley and Washington, D.C.

Removing Kode
From Communications of the ACM

Removing Kode

Dead functions and dead features.

Navigating in Real-Time Environments
From Communications of the ACM

Navigating in Real-Time Environments

An interview with Jim Selman.

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education
From Communications of the ACM

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education

Incorporating equity and inclusion in the effort toward access for everyone.

Where Should Your IT Constraint Be?
From Communications of the ACM

Where Should Your IT Constraint Be?: The Case of the Financial Services Industry

Locating the strategic location of the IT junction constraint.

Using Data and Respecting Users
From Communications of the ACM

Using Data and Respecting Users

Three technical and legal approaches that create value from data and foster user trust.

Copyright's Online Service Providers Safe Harbors Under Siege
From Communications of the ACM

Copyright's Online Service Providers Safe Harbors Under Siege

Reviewing the most significant changes recommended in the recently released U.S. Copyright Office Section 512 Study.

Digital Contact Tracing May Protect Privacy, But It Is Unlikely to Stop the Pandemic
From Communications of the ACM

Digital Contact Tracing May Protect Privacy, But It Is Unlikely to Stop the Pandemic

Considering the potential benefits versus the risks of privacy-enhancing technologies.

How Ransomware Puts Your Hospital at Risk
From ACM Opinion

How Ransomware Puts Your Hospital at Risk

In the midst of the Covid-19 pandemic, the potential consequences of cyberattacks are terrifying.

The Unreasonable Effectiveness of the Julia Programming Language
From ACM Opinion

The Unreasonable Effectiveness of the Julia Programming Language

Fortran has ruled scientific computing, but Julia emerged for large-scale numerical work.

A Holistic View of Future Risks
From Communications of the ACM

A Holistic View of Future Risks

Almost everything is somehow interrelated with everything else—and that should not surprise us.

Sanity vs. Invisible Markings
From Communications of the ACM

Sanity vs. Invisible Markings

Tabs vs. spaces

When Algorithms Give Real Students Imaginary Grades
From ACM Opinion

When Algorithms Give Real Students Imaginary Grades

In-person final exams were canceled for thousands of students this spring, so computers stepped in — to disastrous effect.

Integrating Management Science Into the HPC Research Ecosystem
From Communications of the ACM

Integrating Management Science Into the HPC Research Ecosystem

How management science benefits from High Performance Computing.

Avalanches Make Us All Innovators
From Communications of the ACM

Avalanches Make Us All Innovators

Avalanches generate enormous breakdowns. The practices of innovation adoption may be just what you need to resolve them.

Autonomous Vehicle Safety
From Communications of the ACM

Autonomous Vehicle Safety: Lessons from Aviation

How more than 25years of experience with aviation safety-critical systems can be applied to autonomous vehicle systems.

A Recent Renaissance in Privacy Law
From Communications of the ACM

A Recent Renaissance in Privacy Law

Considering the recent increased attention to privacy law issues amid the typically slow pace of legal change.

The Field of Natural Language Processing is Chasing the Wrong Goal
From ACM Opinion

The Field of Natural Language Processing is Chasing the Wrong Goal

Researchers are too focused on whether AI systems can ace tests of dubious value. They should be testing whether systems grasp how the world works.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account