Systems and Networking
Disrupting Networks: Decentralization and the Fediverse
Meta’s Hyperscale Infrastructure: Overview and Insights
A concise, high-level overview of Meta’s hyperscale infrastructure, with key insights from its development.
Technical Perspective: Shortening the Path to Designing Efficient Graph Algorithms
A new way of designing efficient graph algorithms that will go significantly beyond shortest paths.
Building Safer and Interoperable AI Systems
AI agents are now contemplated that can interact with each other and with information sources on the Internet. What could go wrong?
Brain Implants Give People Back What They Lost
Researchers aim to have paralyzed patients use thoughts to control a prosthetic hand while physical sensations from the hand provide feedback.
Delivering Cloud Data and Analytic Solutions
The LiteLoad project is working to quantify the impact of poor connectivity in rural areas near the Great Smoky Mountains National Park, in Tennessee, as a testing ground.
Access to your production environment must be guarded jealously, even among your own team of developers.
UPI 123Pay: India’s Innovation in Mobile Payments
The payment system was developed for India's 400 million users of simple feature phones instead of smartphones.
Stealth aircraft can foil radar but can't dodge detection by Starlink satellite signals, a game-changer for aerial protection.
From X to Bluesky: To Echo Chamber or Not to Echo Chamber?
Our desire to avoid cognitive dissonance makes us inherently susceptible to echo chambers, a phenomenon intensified by algorithms that curate what we see, creating an environment in which beliefs are seldom challenged.
There are technological reasons why BlueSky is experiencing sharp growth in users and activity.
Aides or staffers registered official email addresses and passwords on vulnerable third-party sites, putting those credentials at risk.
HammingMesh: A Network Topology for Large-Scale Deep Learning
HammingMesh is optimized specifically for ML workloads and their communication patterns.
Technical Perspective: Mirror, Mirror on the Wall, What Is the Best Topology of Them All?
Combining torus topologies’ cost-effectiveness and switched topologies’ performance into a novel network topology.
Transactions and Serverless are Made for Each Other
Serverless cloud platforms should be used to deploy stateful applications.
Confidential Computing or Cryptographic Computing?
Trade-offs between secure computation via cryptography and hardware enclaves.
Laser communications technology demonstrated aboard NASA's Psyche spacecraft could make the 140-million-mile distance from Earth to Mars feel much closer.
You Don’t Know Jack about Bandwidth
Fixes to IP networking help ISPs and other companies make better use of their bandwidth.
How Laser Communications Are Improving Satellites
Demonstrations indicate that laser communications could deliver significantly higher bandwidth than RF, with reduced size, weight, and power requirements on satellites.
Leveraging SaaS and Cloud Solutions for Enhanced Business Agility
Companies that invest in SaaS and cloud solutions improve operations and position themselves for long-term success.
mCaptcha: Replacing Captchas with Rate Limiters to Improve Security and Accessibility
An overview of mCaptcha, a variable-difficulty-based proof-of-work captcha system that addresses the security, usability, and privacy issues with other captchas.
Elevating Security with Arm CCA
RME introduces a new kind of confidential compute environment called a realm.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More