Issue Downloads
Transitioning to distance learning and virtual conferencing
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
Follow us on Twitter at http://twitter.com/blogCACM
http:...
The quantum threat
Cryptographers are developing algorithms to ensure security in a world of quantum computing.
Your wish is my CMD
Artificial intelligence could automate software coding.
Reducing and eliminating e-waste
We need to mitigate the environmental impact of disposing of electronics at their end of useful life.
AI authorship?
Considering the role of humans in copyright protection of outputs produced by artificial intelligence.
Proposal: a market for truth to address false ads on social media
Guaranteeing truth in advertising.
For impactful community engagement: check your role
Toward a more equitable distribution of the benefits of technological change.
Consumers vs. citizens in democracy's public sphere
Attempting to balance the challenging trade-offs between individual rights and our obligations to one another.
Call for a wake standard for artificial intelligence
Suggesting a Voice Name System (VNS) to talk to any object in the world.
The best place to build a subway
Building projects despite (and because of) existing complex systems.
Demystifying stablecoins
Cryptography meets monetary policy.
Domain-specific hardware accelerators
DSAs gain efficiency from specialization and performance from parallelism.
The data science life cycle: a disciplined approach to advancing data science as a science
A cycle that traces ways to define the landscape of data science.
A domain-specific supercomputer for training deep neural networks
- Norman P. Jouppi,
- Doe Hyun Yoon,
- George Kurian,
- Sheng Li,
- Nishant Patil,
- James Laudon,
- Cliff Young,
- David Patterson
Google's TPU supercomputers train deep neural networks 50x faster than general-purpose supercomputers running a high-performance computing benchmark.
Some simple economics of the blockchain
Blockchain technology can shape innovation and competition in digital platforms, but under what conditions?
Spectre attacks: exploiting speculative execution
- Paul Kocher,
- Jann Horn,
- Anders Fogh,
- Daniel Genkin,
- Daniel Gruss,
- Werner Haas,
- Mike Hamburg,
- Moritz Lipp,
- Stefan Mangard,
- Thomas Prescher,
- Michael Schwarz,
- Yuval Yarom
Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a branch depends on a memory value that is in the process of being read, CPUs will try to guess the destination and attempt to ...
ASIC clouds: specializing the datacenter for planet-scale applications
Planet-scale applications are driving the exponential growth of the Cloud, and datacenter specialization is the key enabler of this trend. GPU- and FPGA-based clouds have already been deployed to accelerate compute-intensive workloads. ASIC-based clouds ...
Strategic paddling
Choosing how to best navigate turbulent current events.