Spotting Scams Based on Fake Profiles
A lack of awareness of how scammers operate keeps them just a click away, ready to steal your money, identity, and sensitive information.
Spotting Scams Based on Fake Profiles
A lack of awareness of how scammers operate keeps them just a click away, ready to steal your money, identity, and sensitive information.
Feeling Cranky About AI and CS Education
We are in the throes of another hand-wringing “what will we do” moment.
The Power of Digital Twins in Cybersecurity
The convergence of IT and OT systems has introduced cybersecurity risks where a single weak spot can render an entire network vulnerable.
Remembering Marge Hoogeboom: A Remote Software Development Pioneer (in 1969!)
A jokey suggestion about working from home led to the creation of a dedicated remote system and workflow.
GenAI, the KSA Model, and Why Industry-Experienced CS Teachers Matter More Than Ever
A multidimensional understanding of teaching is increasingly critical in the age of automation and AI.
The Product Manager’s Compass in the Wild West of Generative AI
Evals reveal how and how well a GenAI system works.
Smart Home IoT and Its Impact on Commercial Real Estate
How Context Mastery Creates the New 10x Engineer
Most teams are sitting on vast amounts of context that could help solve longstanding engineering challenges.
A New Era for Retail Computing
AI and cloud technology can predict customer needs, help manage stock, and provide real-time insights.
Why is an image of historic technical importance now banned in respected publications?
Scaling Deep Learning Education in a College of Arts & Sciences
Prerequisites were reduced and students were engaged collecting data using their sense of smell.
Why Computer Science Is No Good, Redux
Simplifications have the effect of ignoring a variety of environmental and operational variables which can alter the behavior of digital systems.
The Vibe Coding Imperative for Product Managers
Vibe coding is transforming the role of product managers, transforming how we prototype, discover insights, and strategize.
AI and the Democratization of Cybercrime
Offensive AI should be regulated like a controlled substance.
How to Boost Research Documentation with Speech Processing Tools
Text-to-speech and speech-to-text tools give scholars more time for critical thinking and drawing thoughtful conclusions.
Why Business Intelligence Alone Won’t Cut It Anymore
Business Intelligence is backward-looking, and has limitations in the modern enterprise.
Visual Object Tracking Challenge: How to Offer a Working Solution in 24 Hours Using Multimodal LLM
A video of a black and white cat poses some playful problems for a computer vision competition.
Benchmarks for AI in Software Engineering
Benchmarks are important for those of us who build software development products that incorporate AI.
Leveraging AI Multi-Agent Systems in Financial Analysis
A key strength of a multi-agent system is its decentralized intelligence and distributed problem-solving approach.
GenAI, Education, and Crisis Situations
The proper integration of AI technologies during routine times can ensure the continuity of learning in emergency situations.
Security Principles for Designing an Unhackable Crypto Wallet
Resilience requires formal rigor, verification tools, and zero-trust assumptions.
Rethinking Distributed Computing for the AI Era
DeepSeek’s mixture-of-experts approach fundamentally changes the distributed computing equation by making computation sparse again.
Harnessing AI, Behavioral Data Science for Smarter Consumer Platforms
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More