Malicious actors appear to be a step ahead of policymakers and educational institutions developing cyber-wellness education and enforcement programs.| Communications of the ACM
The convergence of IT and OT systems has introduced cybersecurity risks where a single weak spot can render an entire network vulnerable.| Communications of the ACM
TMO addresses questions of how much memory to offload and what memory to offload.| Communications of the ACM
The paper presents an evaluation of TMO deployed across millions of servers in Meta’s datacenters.| Communications of the ACM
"When I started listening to what my critics were actually saying, I thought, 'Okay, then that’s what we’re going to do. Thank you for letting me know.'"| Communications of the ACM
A generative AI-powered conversational digital twin integrated with modular clinical pathways could transform liver health management.| Communications of the ACM
Why would an organization choose to remain on a social media platform that is the very antithesis of what the organization embodies and hopes to promote?| Communications of the ACM
A historical perspective on tackling new cyber challenges and securing the future of the computing infrastructure.| Communications of the ACM
A jokey suggestion about working from home led to the creation of a dedicated remote system and workflow.| Communications of the ACM
Training models with synthetic data presents both a danger and a boon to artificial intelligence (AI). While some groups have aggressively pursued the use of model-generated data to train successors for greater accuracy and generalization, others have warned about the risks posed by AI ingesting its own output. The two views are not at odds. The question is when and where things go wrong.| cacm.acm.org
When we refer to "the Internet" we refer not only to the global system of interconnected computer networks but also to the set of applications that utilize this network, including email, the Web, search engines, social media, and the like. To understand where this Internet comes from, we have to revisit the emergence of online communities in the early and mid-1980s. Consider, for example, the WELL, which began in 1985 as a dial-up bulletin board system, self-described as "a cherished watering...| cacm.acm.org
The World Wide Web (Web) emerged as a new medium in the mid-1990s. It was invented by Tim Berners-Lee at the European Organization for Nuclear Research (CERN) in 1989, but its exploding popularity was also enabled by the release of the Mosaic Web browser in 1993 and the Internet becoming commercially available in 1995. A communication revolution was launched.| cacm.acm.org
Computers that combine living human brain cells with silicon chips to form a neural network can now be used by researchers to conduct experiments in different fields.| Communications of the ACM
The goal of generative AI tools, powered by large language models (LLMs), is to finish the task assigned to them; to provide a complete response to a prompt. As is now well-established, models sometimes make things up, or hallucinate, to achieve this. In natural language outputs, hallucinations have degrees of seriousness—minimal in shopping lists, possibly consequential in scientific texts. In code generation, hallucinations are easier to spot and the consequences are clear: the code doesn...| Communications of the ACM
Economists have developed different types of models describing the interaction of agents in markets. Early models in general equilibrium theory describe agents taking prices as given and do not consider the incentives of agents to manipulate prices strategically. With appropriate convexity assumptions on the preferences, such models can be cast as convex optimization problems for which efficient algorithms are known to find a competitive equilibrium. Price-taking behavior might be a reasonabl...| cacm.acm.org
Artificial intelligence (AI) has become one of the most potent force multipliers the criminal underground has ever seen. Generative models that write immaculate prose, mimic voices, and chain exploits together have lowered the cost of sophisticated attacks to almost nothing. | Communications of the ACM
Sentiment analysis (or opinion mining) is defined as the task of finding the opinions of authors about specific entities. The decision-making process of people is affected by the opinions formed by thought leaders and ordinary people. When a person wants to buy a product online he or she will typically start by searching for reviews and opinions written by other people on the various offerings. Sentiment analysis is one of the hottest research areas in computer science. Over 7,000 articles ha...| cacm.acm.org
A student engages with a computer through a touchscreen.| cacm.acm.org
Physical scientists and engineering research and development (R&D) teams are embracing neural networks in attempts to accelerate their simulations. From quantum mechanics to the prediction of blood flow in the body, numerous teams have reported on speedups in simulation by swapping conventional finite-element solvers for models trained on various combinations of experimental and synthetic data.| cacm.acm.org
Many developers and project managers focus on building functional code and shipping products rapidly, while overlooking the importance of maintaining detailed, precise, and comprehensive documentation. | Communications of the ACM
Research documentation is the process of recording data related to the hypothesis, methodology, references, and conclusions of a research study. It also includes personal notes and observations of the participants to ensure transparency and credibility of the process.| Communications of the ACM
Computer vision competitions are currently an important event for teams working in this area. They provide an opportunity to try new solutions, practice, and simply enjoy solving interesting problems.| Communications of the ACM
Systems that respond to user actions quickly (within 100ms) feel more fluid and natural to users than those that take longer.3 Improvements in Internet connectivity and the rise of warehouse-scale computing systems2 have enabled Web services that provide fluid responsiveness while consulting multi-terabyte datasets spanning thousands of servers; for example, the Google search system updates query results interactively as the user types, predicting the most likely query based on the prefix typ...| cacm.acm.org
Quantum computing’s promise is inching closer to reality. In the coming years, these systems will likely lead to breakthroughs in areas as diverse as drug discovery, materials science, financial modeling, and macroeconomics. They could potentially tackle tasks in minutes or hours that would require years or even centuries using classical computers.| cacm.acm.org
Research and Advances Jul 24 2025| cacm.acm.org
1 Introduction| cacm.acm.org
Each time someone interacts with a large language model (LLM), there is an energy cost in running the model for inference. In addition, there is an energy cost in the preparation and training of the model before it was brought to production. It is relatively easy to look at these costs in terms of kilowatt-hours (kWh), but it is hard to compare that to the alternative use of human time. To write a text like this one, the process involves a human and a computer running a word processor. If an ...| Communications of the ACM
Micah D. Beck| cacm.acm.org
Amazon Web Services (AWS) strives to deliver reliable services that customers can trust completely. This requires maintaining the highest standards of security, durability, integrity, and availability—with systems correctness serving as the cornerstone for achieving these priorities. An April 2015 article published in Communications of the ACM, titled “How Amazon Web Services Uses Formal Methods,” highlighted the approach for ensuring the correctness of critical services that have since...| cacm.acm.org
Engineering Culture| cacm.acm.org
In this Inside Risks column, we explore memory-safety standardization, which we argue is an essential step to promoting universal strong memory safety in government and industry, and, in turn, to ensure access to more secure software for all. During the last two decades, a set of research technologies for strong memory safety—memory-safe languages, hardware and software protection, formal approaches, and software compartmentalization—have reached sufficient maturity to see early deploymen...| cacm.acm.org
1991 and All That| cacm.acm.org
Last fall, Eric Klopfer decided to conduct an experiment in his undergraduate computer science class at the Massachusetts Institute of Technology (MIT). He divided the class into three groups and gave them a programming task to solve in the Fortran language, which none of them knew.| cacm.acm.org
India is home to almost one-fifth of the world’s population. Its scale and diversity rival those of continents, not countries. India has “official” 22 languages but unofficially 19,500 languages have been recognized as having 10,000 speakers or more.a There is incredible diversity, but also incredible disparity. About 45 million people still live in extreme poverty,b and less than 4% of its 1.3 billion people paid any income tax at all.c| cacm.acm.org
We are excited to announce that Communications of the ACM (CACM) is now a fully Open Access publication. This means that more than six decades of CACM’s renowned research articles, seminal papers, technical reports, commentaries, real-world practice, and news articles are now open to everyone, regardless of whether they are members of ACM or subscribe to the ACM Digital Library.| cacm.acm.org