Federal Research Investment and Innovation in Information Technology: A Virtuous Cycle
Federal investment in research, particularly in the dynamic and rapidly evolving field of computing, is not merely an expenditure but a strategic imperative.
Federal Research Investment and Innovation in Information Technology: A Virtuous Cycle
Federal investment in research, particularly in the dynamic and rapidly evolving field of computing, is not merely an expenditure but a strategic imperative.
Toward Ubiquitous Operating Systems: Lessons from the Field
Ubiquitous operating systems are rapidly revolutionizing the ecosystem of consumer electronics and IoT.
Confusing the Map for the Territory
Trying to capture culture in datasets is akin to believing you have captured everything important about the world in a map.
Embracing Her Critics To Refine VoIP
"When I started listening to what my critics were actually saying, I thought, 'Okay, then that’s what we’re going to do. Thank you for letting me know.'"
A Generative AI-Powered Digital Twin for Adaptive NASH Care
A generative AI-powered conversational digital twin integrated with modular clinical pathways could transform liver health management.
Deleting X: Why SIGDOC Left the Platform
Why would an organization choose to remain on a social media platform that is the very antithesis of what the organization embodies and hopes to promote?
Will AI Destroy the World Wide Web?
The stable business model on which the Web thrived is now being threatened by GenAI.
Human subjugation by uncaring machines is a very plausible path to a different singularity.
Concerning the Responsible Use of AI in the U.S. Criminal Justice System
Proprietary AI systems should not play a role in the justice system of a society that values individual rights and government accountability.
A truly global approach to AI can only emerge by emphasizing the centrality of culture, understood as the ideas, customs, and social behaviors of a people, a period, a group, or humanity in general.
Deconstructing the Take It Down Act
It is easy to imagine the FTC weaponizing its newfound Take It Down Act authority as a tool of censorship and extortion.
Stop Using Vulnerability Counts to Measure Software Security
A project with a history of vulnerability fixes doesn't mean it is less secure.
New ideas are emerging to make communication among interacting agents more reliable and precise.
An AI system targeting company management may be subtly manipulating communication channels like email and chat.
Empowering Virtual Agents With Intelligent Systems
Environmental Embodied AI employs virtual agents in non-robotic applications to influence and affect physical or operational states within environments.
There is a tendency in software to keep piling on features and functions, which is anathema to simplicity and repeatability.
Two Types of Data Privacy Controls
Precise, sensible, and easy to use terms to differentiate the two intrinsic types of privacy controls will positively impact the accuracy of privacy research and discussions.
Active learning provides a compelling alternative to the “bigger is better” assumption dominating current thinking about AI.
The Future of Professional Ethics in Computing
Computing professionals should use their privileges and insights to help societies navigate questions about digital technologies that traditional ethical theories find difficult to answer.
Balancing Secrecy and Transparency in Bug Bounty Programs
Embracing transparency while balancing temporary secrecy can lead to a more resilient and accountable software ecosystem.
The Ethical Implications of Online Computer Science Education
Can online computer science programs adequately prepare students for industry demands, especially in fields requiring hands-on problem-solving?
A consensus is emerging that copyright laws should include human creation requirements.
DeepSeek Inside: Origins, Technology, and Impact
How a little-known Chinese startup disrupted the GenAI ecosystem.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More