Sign In

Communications of the ACM

Recent Articles



The Brutal Truth About Bitcoin
From ACM Opinion

The Brutal Truth About Bitcoin

Are cryptocurrencies the wave of the future and should you be using and investing in them?

As Science Advances, Does Ockham's Razor Still Apply?
From ACM Opinion

As Science Advances, Does Ockham's Razor Still Apply?

The notion that the simpler explanation is usually right has been useful for centuries. New science may change that.

What Makes Quantum Computing So Hard to Explain?
From ACM Opinion

What Makes Quantum Computing So Hard to Explain?

To understand what quantum computers can do—and what they can’t—avoid falling for overly simple explanations.

Reward Is Enough for Generalized AI
From ACM Opinion

Reward Is Enough for Generalized AI

The generic objective of maximizing reward is enough to drive behavior that exhibits most abilities studied in natural and artificial intelligence.

Machine Learning Security Needs New Perspectives and Incentives
From ACM Opinion

Machine Learning Security Needs New Perspectives and Incentives

Researchers and developers racing to make deep learning available to different applications need to actively seek out and address security challenges before they...

Theorists and Experimentalists Must Join Forces
From ACM Opinion

Theorists and Experimentalists Must Join Forces

Collaborations between theorists and experimentalists are crucial for accelerating research.

For Companies That Use ML, Labeled Data Is the Key Differentiator
From ACM Opinion

For Companies That Use ML, Labeled Data Is the Key Differentiator

Any company that is considering using machine learning cannot overlook one technical choice: supervised or unsupervised learning.

Should Alexa Read Our Moods?
From ACM Opinion

Should Alexa Read Our Moods?

Companies should be barred from analyzing what people say and how they sound to recommend products or personalize advertising messages.

Collusion Rings Threaten the Integrity of Computer Science Research
From Communications of the ACM

Collusion Rings Threaten the Integrity of Computer Science Research

Experiences discovering attempts to subvert the peer-review process.

Aversion to Versions
From Communications of the ACM

Aversion to Versions

Code needs to run anywhere as long as the necessary dependencies can be resolved.

The Risks of Election Believability (or Lack Thereof)
From Communications of the ACM

The Risks of Election Believability (or Lack Thereof)

With 90% of the 2020 U.S. general election ballot contents verifiable by paper, why do only 65% of voters trust the results?

Defining a Role for AI Ethics in National Security
From ACM Opinion

Defining a Role for AI Ethics in National Security

Mariarosaria Taddeo, an associate professor and senior research fellow at the Oxford Internet Institute and Dstl Ethics Fellow at the Alan Turing Institute, discusses...

Cooperative AI: Machines Must Learn to Find Common Ground
From ACM Opinion

Cooperative AI: Machines Must Learn to Find Common Ground

To help humanity solve fundamental problems of cooperation, scientists need to reconceive artificial intelligence as deeply social.

Trustworthy Scientific Computing
From Communications of the ACM

Trustworthy Scientific Computing

Addressing the trust issues underlying the current limits on data sharing.

The 10 Best Practices for Remote Software Engineering
From Communications of the ACM

The 10 Best Practices for Remote Software Engineering

Focusing on the human element of remote software engineer productivity.

Let's Be Honest
From Communications of the ACM

Let's Be Honest

Seeking to rectify the two mutually exclusive ways of comparing computational power — encoding and simulation.

Building a Multilingual Wikipedia
From Communications of the ACM

Building a Multilingual Wikipedia

Seeking to develop a multilingual Wikipedia where content can be shared among language editions.

Roots of 'Program' Revisited
From Communications of the ACM

Roots of 'Program' Revisited

Considering the fundamental nature and malleability of programming.

When Hackers Were Heroes
From Communications of the ACM

When Hackers Were Heroes

The complex legacy of Steven Levy's obsessive programmers.

The Non-Psychopath's Guide to Managing an Open Source Project
From Communications of the ACM

The Non-Psychopath's Guide to Managing an Open Source Project

Respect your staff, learn from others, and know when to let go.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account