Sign In

Communications of the ACM

Video Highlights


Bouncing Balls and Quantum Computing

A lighthearted method for calculating π is analogous to a fundamental algorithm for quantum computing.

Who Has Access to Your Smartphone Data?

ISPs, app developers, and even the government may know more about you than you think.

Real Time Spent on Real Time

The story of the development of a sound, static method for worst-case execution-time analysis.

A Decade of Social Bot Detection

Bots increasingly tamper with political elections and economic discussions. Tracing trends in detection strategies an...

It's Alive!

Scientists and engineers cross the reality gap, transferring simulated evolution into real machines.

Keeping CALM: When Distributed Consistency Is Easy

In distributed systems theory, CALM presents a result that delineates the frontier of the possible.

Neuromorphic Chips Take Shape

Chips designed specifically to model the neurons and synapses in the human brain are poised to change computing in pr...

Are We Addicted to Technology?

Experts agree technology causes some negative behaviors, but they are divided on how bad the problem is.

Digital Humans on the Big Screen

Motion pictures are using new techniques in computer-generated imagery to create feature-length performances by convi...