Beyond Compliance: Security Documentation as a Strategic Asset
It’s time to stop viewing security documentation as a necessary evil and start leveraging it as a strategic asset.
Beyond Compliance: Security Documentation as a Strategic Asset
It’s time to stop viewing security documentation as a necessary evil and start leveraging it as a strategic asset.
You Need Much Less Memory than Time
An upcoming STOC conference paper reports a huge near-quadratic improvement that will go down as a true classic complexity theorem.
The Challenge of Consistency in Generative AI: Will We Adapt or Fix the System?
The Role of Research in Preparing K-12 Students for Computer Science and AI
K-12 education needs to build on CS successes and prepare students for an AI-powered world.
GenAI as a Teacher Guide and Coding Companion (Part 1)
GenAI could be the perfect coding companion for novice CS teachers in K-12 classrooms.
Why Policies and Training Fail Without a Strong Cybersecurity Culture
Organizations must foster a culture of trust where employees feel comfortable discussing security concerns openly.
Generative AI tools are becoming a fundamental part of how students learn and work.
HR has shifted from performing administrative tasks to using analytics to develop more productive workers and leaders.
A Pragmatic Overview of Wi-Fi Security Risks
Communication between each device on a Wi-Fi network and its router should be secured with strong encryption because the signals can literally be snatched out of the air.
The creator of C++ presents key concepts for performant, type-safe, and flexible C++ software.
AI Agents: Automation is Not Enough
AI Agents adapt to changes, learn from feedback, and can act autonomously or in collaboration with humans or other agents.
Shaping the Future of Technology
Developing Effective Stakeholder Engagement Strategies in Agile Projects
Strategies for productive stakeholder interaction, better project outcomes, and reinforcing agile values.
The Hidden Risks of URL-Shortening in Scientific Review
Reviewers, authors, and editors all have a role to play in protecting fairness and objectivity in the blind review process.
Assessment in Computer Science Education in the GenAI Era
Exploring the need to rethink assessment in computer science education in the Generative AI era.
We’re Reaping Just What We Sowed
The idea of computing using an abstract machine model that can grow during the execution of an algorithm leads to a theory of computation that is quite rich.
Delivering Cloud Data and Analytic Solutions
Generative AI: A Master List Maker
There are surprising uses of Generative AI that aren’t what people have generally been thinking.
Is Computer Science a Profession? Should It Be?
There are sensitivities and even dangers in the human realms affected by computer science.
Professionals must invest in continuous education to understand AI's potential, avoid pitfalls, and harness its benefits.
Strengthening Security Throughout the ML/AI Lifecycle
Automation, audits, and access control are some of the ways to enhance security in ML systems.
Zero-Trust Security in Software Development
The zero-trust security model is a proactive approach to overcoming potential threats and enhancing application security.
Computation and Deliberation: The Ghost in the Habermas Machine
People interacting only with the Habermas Machine to develop policy neglect the relational and interpersonal dynamics crucial to democratic deliberation.
AI-Driven Code Review: Enhancing Developer Productivity and Code Quality
AI-driven code review tools use deep learning and natural language processing to understand coding patterns and offer suggestions.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More