Export Citations
Issue Downloads
The solution to AI, what real researchers do, and expectations for CS classrooms
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
Follow us on Twitter at http://twitter.com/blogCACM
http://...
The key to privacy
40 years ago, Whitfield Diffie and Martin E. Hellman introduced the public key cryptography used to secure today's online transactions.
What happens when big data blunders?
Big data is touted as a cure-all for challenges in business, government, and healthcare, but as disease outbreak predictions show, big data often fails.
Reimagining search
Search engine developers are moving beyond the problem of document analysis, toward the elusive goal of figuring out what people really want.
What's next for digital humanities?
New computational tools spur advances in an evolving field.
The risks of self-auditing systems
Unforeseen problems can result from the absence of impartial independent evaluations.
What are you trying to pull?
A single cache miss is more expensive than many instructions.
How to produce innovations
Making innovations happen is surprisingly easy, satisfying, and rewarding if you start small and build up.
An interview with Yale Patt
ACM Fellow Professor Yale Patt reflects on his career in industry and academia.
Computer science should stay young
Seeking to improve computer science publication culture while retaining the best aspects of the conference and journal publication processes.
Privacy is dead, long live privacy
Protecting social norms as confidentiality wanes.
A byte is all we need
A teenager explores ways to attract girls into the magical world of computer science.
Nine things I didn't know I would learn being an engineer manager
Many of the skills aren't technical at all.
The flame graph
This visualization of software execution is a new necessity for performance profiling and debugging.
Standing on distributed shoulders of giants
Farsighted physicists of yore were danged smart!
Improving API usability
Human-centered design can make application programming interfaces easier for developers to use.
Physical key extraction attacks on PCs
Computers broadcast their secrets via inadvertent physical emanations that are easily measured and exploited.
RandNLA: randomized numerical linear algebra
Randomization offers new benefits for large-scale linear algebra computations.
Q&A: Finding New Directions in Cryptography
Whitfield Diffie and Martin Hellman on their meeting, their research, and the results that billions use every day.