The Process-Object Duality in Computer Science and Data Science Education
BLOG@CACM
Starlink’s Critical Vulnerability, or Elon Musk is Not Worrying in Vain
Choosing a DAST Solution: What to Pay Attention To
Data Loss Prevention vs. Data-Centric Audit and Protection: What Is the Difference?
Data Governance and the Psychology of Tension Management
Three Risks Facing Higher Education
In Pursuit of an International Computation Center in Europe
Reflections on the AI Bill of Rights Blueprint
Where to Look: CS Ethics Research
Four Conversations About Human-Centric AI
New Research Vindicates Fodor and Pylyshyn: No Explainable AI Without ‘Structured Semantics’
Heinz Rutishauser, a Forgotten Swiss Pioneer
Lessons Learned Writing For BLOG@CACM
Opportunities of Data Science Education
Which Were the Most Influential Early Computers?
DevSecOps: Resolving Disagreements Between Developers and Security Teams
The Continual Re-Creation Of The Key-Value Datastore
A History of One Brute-Force Attack
Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More