Cyber Trust Mark to Distinguish Secure Smart Home Devices
The U.S. Cyber Trust Mark program is a mechanism for providers of wireless smart home devices to test and certify the security of their products.
Cyber Trust Mark to Distinguish Secure Smart Home Devices
The U.S. Cyber Trust Mark program is a mechanism for providers of wireless smart home devices to test and certify the security of their products.
The UGC Overload: Scaling Content Moderation for Massive Datasets
AI and ML have a role to play in moderating user-generated content in real time to keep sites safe, civilized, and legally compliant.
Reasons to Raise the Cyber-Shields
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite
An investigation of vulnerabilities within the TCP/IP protocol suite that can be exploited by forged ICMP errors.
AI Upgrades the Internet of Things
A Pragmatic Overview of Wi-Fi Security Risks
Communication between each device on a Wi-Fi network and its router should be secured with strong encryption because the signals can literally be snatched out of the air.
Disrupting Networks: Decentralization and the Fediverse
Meta’s Hyperscale Infrastructure: Overview and Insights
A concise, high-level overview of Meta’s hyperscale infrastructure, with key insights from its development.
Technical Perspective: Shortening the Path to Designing Efficient Graph Algorithms
A new way of designing efficient graph algorithms that will go significantly beyond shortest paths.
Building Safer and Interoperable AI Systems
AI agents are now contemplated that can interact with each other and with information sources on the Internet. What could go wrong?
Brain Implants Give People Back What They Lost
Researchers aim to have paralyzed patients use thoughts to control a prosthetic hand while physical sensations from the hand provide feedback.
Delivering Cloud Data and Analytic Solutions
The LiteLoad project is working to quantify the impact of poor connectivity in rural areas near the Great Smoky Mountains National Park, in Tennessee, as a testing ground.
Access to your production environment must be guarded jealously, even among your own team of developers.
UPI 123Pay: India’s Innovation in Mobile Payments
The payment system was developed for India's 400 million users of simple feature phones instead of smartphones.
Stealth aircraft can foil radar but can't dodge detection by Starlink satellite signals, a game-changer for aerial protection.
From X to Bluesky: To Echo Chamber or Not to Echo Chamber?
Our desire to avoid cognitive dissonance makes us inherently susceptible to echo chambers, a phenomenon intensified by algorithms that curate what we see, creating an environment in which beliefs are seldom challenged.
There are technological reasons why BlueSky is experiencing sharp growth in users and activity.
Aides or staffers registered official email addresses and passwords on vulnerable third-party sites, putting those credentials at risk.
HammingMesh: A Network Topology for Large-Scale Deep Learning
HammingMesh is optimized specifically for ML workloads and their communication patterns.
Technical Perspective: Mirror, Mirror on the Wall, What Is the Best Topology of Them All?
Combining torus topologies’ cost-effectiveness and switched topologies’ performance into a novel network topology.
Transactions and Serverless are Made for Each Other
Serverless cloud platforms should be used to deploy stateful applications.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More