Issue Downloads
Protecting the power grid, and finding bias in student evaluations
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
Follow us on Twitter at http://twitter.com/blogCACM
http://...
Quantum technology forgoes unconditional security to extend its reach
Two projects in China demonstrate the possibility of global quantum key distribution networks.
Going serverless
Serverless computing lets businesses and application developers focus on the program they need to run, without worrying about the machine on which it runs, or the resources it requires.
The war over the value of personal data
In a world increasingly dependent on turning personal data into profits, it is unclear how much that data is actually worth.
Risks of trusting the physics of sensors
Protecting the Internet of Things with embedded security.
The inclusive and accessible workplace
Maximizing the performance of neurodiverse talent.
Reducing the attack surface
Sometimes you can give the monkey a less-dangerous club.
Teaching artificial intelligence and humanity
Considering rapidly evolving human-machine interactions.
Innovation from the edges
How innovation originates from market participants with multiple perspectives about commercial value.
Titus: introducing containers to the Netflix cloud
Approaching container adoption in an already cloud-native infrastructure.
Research for practice: private online communication; highlights in systems verification
Expert-curated guides to the best of CS research.
Views from the top
Try to see things from a manager's perspective.
The next phase in the digital revolution: intelligent tools, platforms, growth, employment
Digital technology determines how (and even whether) people work as much as it determines how information produces economic activity.
A large-scale comparative study of beta testers and regular users
Beta testers should represent a future product's target users as much as possible.
Elements of the theory of dynamic networks
The challenge of computing in a highly dynamic environment.
Practical verification of peephole optimizations with Alive
Compilers should not miscompile. Peephole optimizations, which perform local rewriting of the input program to improve the efficiency of generated code, are a persistent source of compiler bugs. We created Alive, a domain-specific language for writing ...
Welcome to the singularity
Who can say no to the hive mind's promise of cybernetic immortality, for free?