Beyond Compliance: Security Documentation as a Strategic Asset
It’s time to stop viewing security documentation as a necessary evil and start leveraging it as a strategic asset.
Beyond Compliance: Security Documentation as a Strategic Asset
It’s time to stop viewing security documentation as a necessary evil and start leveraging it as a strategic asset.
Preprinting in AI Ethics: Toward a Set of Community Guidelines
Preprinting allows for the rapid dissemination of new ideas, but also of junk science and potentially of research without due ethics approval.
Barto, Sutton Announced as ACM 2024 A.M. Turing Award Recipients
Program Merge: What’s Deep Learning Got to Do with It?
Leading figures of Microsoft Research's DeepMerge project discuss their efforts to apply machine learning to complicated program merges.
Abstraction is a by-product of computer science's central purpose, understanding information processes.
The Sustainability Gap for Computing: Quo Vadis?
A reformulated IPAT model provides insight for computer system engineers to consider computing's environmental impact.
HR has shifted from performing administrative tasks to using analytics to develop more productive workers and leaders.
Should governments decide what regulations are necessary to ensure safe development and deployment of AI technologies?
An expected shortfall in skilled workers poses a risk to the U.S.'s ability to compete in the global semiconductor manufacturing and chip design industry, the SIA says.
Shaping the Future of Technology
Fit for People, Fit for Purpose: Designing Tech that Matters
My computing degree enabled me to create better-fitting technologies for people and what is important to them.
Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions
Our work attempts to characterize the tendency of Copilot to produce insecure code.
Initiatives created for the 2023 UbiComp/ISWC conference illustrate what can and should be done to support the needs of a diverse, increasingly global computing community.
I Was Wrong about the Ethics Crisis
Anxiety about the ills brought on by computing has risen dramatically.
Zero-Trust Security in Software Development
The zero-trust security model is a proactive approach to overcoming potential threats and enhancing application security.
Access to your production environment must be guarded jealously, even among your own team of developers.
AI-Driven Code Review: Enhancing Developer Productivity and Code Quality
AI-driven code review tools use deep learning and natural language processing to understand coding patterns and offer suggestions.
Improving CS Performance by Developing Spatial Skills
Research suggests that attention to the type of games and puzzles we play can improve performance in CS degree programs and beyond.
Advanced Machine Learning Algorithms for HR Analytics
Finding Roles in a Team with Generative AI
Generative AI can help an organization fill roles that are responsible for different parts of a project.
Diversity Examples Inappropriate
There is little convincing evidence that anything other than ability, knowledge, and communication skills drives the success of teams working in software and hardware development.
From Dot Matrix to Data: A Journey through Technology and Leadership
The middle school I attended had a state-of-the-art lab equipped with the latest Apple II computers.
Considering Conference Contributions
How to get the most out of the time and effort of serving on Program Committees.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More