The State of Digital Accessibility
One way to advance accessibility is to ensure that people with disabilities are represented at all levels in the industry—from end-user testers, to developers, to corporate leaders.
The State of Digital Accessibility
One way to advance accessibility is to ensure that people with disabilities are represented at all levels in the industry—from end-user testers, to developers, to corporate leaders.
Program Merge: What’s Deep Learning Got to Do with It?
Leading figures of Microsoft Research's DeepMerge project discuss their efforts to apply machine learning to complicated program merges.
Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions
There seems to be a gap in how cryptographic and non-cryptographic hash functions are designed.
Access to your production environment must be guarded jealously, even among your own team of developers.
Transactions and Serverless are Made for Each Other
Serverless cloud platforms should be used to deploy stateful applications.
Confidential Computing or Cryptographic Computing?
Trade-offs between secure computation via cryptography and hardware enclaves.
Toward Effective AI Support for Developers
Insights into the opportunities and concerns that developers have with using AI in their work.
You Don’t Know Jack about Bandwidth
Fixes to IP networking help ISPs and other companies make better use of their bandwidth.
Elevating Security with Arm CCA
RME introduces a new kind of confidential compute environment called a realm.
Cloud computing poses challenges for systems that require confidentiality.
Trustworthy AI Using Confidential Federated Learning
Classic federated learning emphasizes security and privacy, at the cost of transparency and accountability. Confidential Federated Learning addresses this gap.
A Perspectival Mirror of the Elephant
Language bias sets a cultural barrier online and has serious implications for how Internet-based platforms reach across societal divides.
Free and Open Source Software–and Other Market Failures
Computing has scientific roots, and if it is not open source, it is not science.
From Open Access to Guarded Trust
Engineers stand at a unique confluence, where the exhilarating promise of innovation meets the sobering responsibility of trust stewardship.
Developer Ecosystems for Software Safety
Building safety and security considerations into the design of the developer ecosystem.
Adopting and Sustaining Microservice-Based Software Development
The microservice approach to software development offers an alternative to the conventional monolith style.
Resolving the Human-Subjects Status of ML’s Crowdworkers
What ethical framework should govern the interaction of ML researchers and crowdworkers?
The popularity of RISC-V and lower barriers to entry have led a number of parties to design some or all of an instruction set for the architecture.
Access to a system should not imply authority to use it. Enter the principle of complete mediation.
Device Onboarding Using FDO and the Untrusted Installer Model
FDO’s untrusted model is contrasted with Wi-Fi Easy Connect to illustrate the advantages of each mechanism.
Improving Testing of Deep-Learning Systems
A combination of differential and mutation testing results in better test data.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More