Sign In

Communications of the ACM

Recent Articles



Let's Not Dumb Down the History of Computer Science
From Communications of the ACM

Let's Not Dumb Down the History of Computer Science

Donald Knuth on the best way to recognize the history of computer science.

Polanyi's Revenge and AI's New Romance with Tacit Knowledge
From Communications of the ACM

Polanyi's Revenge and AI's New Romance with Tacit Knowledge

Artificial intelligence systems need the wisdom to know when to take advice from us and when to learn from data.

Cybersecurity
From Communications of the ACM

Cybersecurity: Is It Worse than We Think?

Evaluating actual implementations and practices versus stated goals.

When Permissioned Blockchains Deliver More Decentralization Than Permissionless
From Communications of the ACM

When Permissioned Blockchains Deliver More Decentralization Than Permissionless

Considerations for the governance of distributed systems.

Excessive Use of Technology
From Communications of the ACM

Excessive Use of Technology: Can Tech Providers be the Culprits?

Seeking to assess the possible responsibility of tech providers for excessive use patterns.

The Immortal Soul of an Old Machine
From Communications of the ACM

The Immortal Soul of an Old Machine

Taking apart a book to figure out how it works.

Content Moderation Modulation
From Communications of the ACM

Content Moderation Modulation

Deliberating on how to regulate—or not regulate—online speech in the era of evolving social media.

Cybersecurity Research for the Future
From Communications of the ACM

Cybersecurity Research for the Future

Considering the wide range of technological and societal trade-offs associated with cybersecurity.

Boeing's 737 MAX
From Communications of the ACM

Boeing's 737 MAX: A Failure of Management, Not Just Technology

Tracing the trajectory of management and engineering decisions resulting in systemic catastrophe.

Federated Learning for Privacy-Preserving AI
From Communications of the ACM

Federated Learning for Privacy-Preserving AI

Engineering and algorithmic framework to ensure data privacy and user confidentiality.

Silicon Politics
From Communications of the ACM

Silicon Politics

Tracing the widening path between Silicon Valley and Washington, D.C.

Removing Kode
From Communications of the ACM

Removing Kode

Dead functions and dead features.

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education
From Communications of the ACM

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education

Incorporating equity and inclusion in the effort toward access for everyone.

Operationalizing AI Ethics Principles
From Communications of the ACM

Operationalizing AI Ethics Principles

A better ethics analysis guide for developers.

Reason-Checking Fake News
From Communications of the ACM

Reason-Checking Fake News

Using argument technology to strengthen critical literacy skills for assessing media reports.

Using Data and Respecting Users
From Communications of the ACM

Using Data and Respecting Users

Three technical and legal approaches that create value from data and foster user trust.

Copyright's Online Service Providers Safe Harbors Under Siege
From Communications of the ACM

Copyright's Online Service Providers Safe Harbors Under Siege

Reviewing the most significant changes recommended in the recently released U.S. Copyright Office Section 512 Study.

Digital Contact Tracing May Protect Privacy, But It Is Unlikely to Stop the Pandemic
From Communications of the ACM

Digital Contact Tracing May Protect Privacy, But It Is Unlikely to Stop the Pandemic

Considering the potential benefits versus the risks of privacy-enhancing technologies.

Self-Driving Vehicle Technology
From Communications of the ACM

Self-Driving Vehicle Technology: Progress and Promises

Seeking the answer to the elusive question, 'Are we there yet'?

A Holistic View of Future Risks
From Communications of the ACM

A Holistic View of Future Risks

Almost everything is somehow interrelated with everything else—and that should not surprise us.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account