Communications Practice Section Welcomes Submissions
We look forward to working with authors whose articles expand both the utility and the delights of computing.
Communications Practice Section Welcomes Submissions
We look forward to working with authors whose articles expand both the utility and the delights of computing.
When Is WebAssembly Going to Get DOM Support?
There are still ways to further reduce the overhead of programs that span the JavaScript/Wasm boundary.
Call for Papers: CACM Practice Section
Submit articles for inclusion in CACM’s Practice section, dedicated to enhancing practitioners’ understanding of computing and improving job performance.
The way we refer to and address data matters, and can have unexpected effects down the line.
Fifty Years of Open Source Software Supply-Chain Security
Problems with software supply-chain security are fundamental and have no easy answers.
The vulnerability of LLMs to hallucination, prompt injection, and jailbreaks poses a significant but surmountable challenge to their widespread adoption.
Systems Correctness Practices at Amazon Web Services
A survey of the portfolio of formal methods used across AWS to deliver complex services with high confidence in assuring systems correctness.
Deterministic Record-and-Replay
Recent research advances related to deterministic record-and-replay show its broad and enduring applicability.
The State of Digital Accessibility
One way to advance accessibility is to ensure that people with disabilities are represented at all levels in the industry—from end-user testers, to developers, to corporate leaders.
Program Merge: What’s Deep Learning Got to Do with It?
Leading figures of Microsoft Research's DeepMerge project discuss their efforts to apply machine learning to complicated program merges.
Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions
There seems to be a gap in how cryptographic and non-cryptographic hash functions are designed.
Access to your production environment must be guarded jealously, even among your own team of developers.
Transactions and Serverless are Made for Each Other
Serverless cloud platforms should be used to deploy stateful applications.
Confidential Computing or Cryptographic Computing?
Trade-offs between secure computation via cryptography and hardware enclaves.
Toward Effective AI Support for Developers
Insights into the opportunities and concerns that developers have with using AI in their work.
You Don’t Know Jack about Bandwidth
Fixes to IP networking help ISPs and other companies make better use of their bandwidth.
Elevating Security with Arm CCA
RME introduces a new kind of confidential compute environment called a realm.
Cloud computing poses challenges for systems that require confidentiality.
Trustworthy AI Using Confidential Federated Learning
Classic federated learning emphasizes security and privacy, at the cost of transparency and accountability. Confidential Federated Learning addresses this gap.
A Perspectival Mirror of the Elephant
Language bias sets a cultural barrier online and has serious implications for how Internet-based platforms reach across societal divides.
Free and Open Source Software–and Other Market Failures
Computing has scientific roots, and if it is not open source, it is not science.
From Open Access to Guarded Trust
Engineers stand at a unique confluence, where the exhilarating promise of innovation meets the sobering responsibility of trust stewardship.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More