Architecture and Hardware
AI Datacenters Need Nuclear Fusion
Fusion reactors may answer the question of where energy for AI datacenters will come from.
Why Dexterous Hands Matter for Embodied AI
Dexterous robotic hands are the decisive interface between embodied AI and the physical world.
Bandwidth is Dead. Long Live Data Logistics
Latency hiding techniques avoid the technically challenging problem of minimizing end-to-end transmission delay.
The Cyber Vulnerabilities Lurking in CRM Systems
Technology alone isn’t to blame for CRM vulnerabilities; users themselves often create the weakest links.
Juice jacking requires attackers to tamper with a public USB charging station to load malicious software that would open a device to two-way data transfer.
Digital Twins: Initiatives, Technologies, and Use Cases in the Arab World
Despite promising advancements, the Arab region faces several challenges that are slowing down the adoption of digital twins.
Smash: Flexible, Fast, and Resource-Efficient Placement and Lookup of Distributed Storage
Smash achieves full placement flexibility, fast storage operations, fast recovery from node dynamics, and lower DRAM cost compared to existing hash-based solutions.
Technical Perspective: Where Is My Data?
Smash provides full placement flexibility in assigning data to any machine while reducing memory overhead costs compared to current approaches used in practice.
Aerial Solutions for Supporting Large-Scale Events: A Case Study of the Hajj Pilgrimage
NTFPs offer high-altitude deployment, wide coverage, and robust backhaul capacity.
Quantum Computing Research in the Arab World
Multiple countries in the Arab world are investing in quantum computing research, fostering collaborations, and developing talent to engage with the transformative technology.
The way we refer to and address data matters, and can have unexpected effects down the line.
Strengthening Enterprise Quantum Security
The clock isn’t ready to strike midnight on outdated encryption, but it’s ticking louder every day.
Remote systems support troubleshooting and can also be used for updates, monitoring performance, and training staff.
How Far Away Is Quantum Supremacy?
Two big obstacles stand between current quantum computers and the hardware needed for business use cases.
Improving Everyday Computer-Human Interactions
Solutions presented in several papers at CHI 2025 may not be as simple to implement as they sound, experts say.
Fighting for the Right to Repair
Advocates say incentives such as taxes on non-reparable goods and subsidies for repair-friendly designs could encourage manufacturers to support DIY repairs.
Spotting Scams Based on Fake Profiles
A lack of awareness of how scammers operate keeps them just a click away, ready to steal your money, identity, and sensitive information.
The Power of Digital Twins in Cybersecurity
The convergence of IT and OT systems has introduced cybersecurity risks where a single weak spot can render an entire network vulnerable.
TMO: Transparent Memory Offloading in Datacenters
TMO addresses questions of how much memory to offload and what memory to offload.
Technical Perspective: Memory Efficiency via Offloading in Warehouse-Scale Datacenters
The paper presents an evaluation of TMO deployed across millions of servers in Meta’s datacenters.
A Generative AI-Powered Digital Twin for Adaptive NASH Care
A generative AI-powered conversational digital twin integrated with modular clinical pathways could transform liver health management.
Remembering Marge Hoogeboom: A Remote Software Development Pioneer (in 1969!)
A jokey suggestion about working from home led to the creation of a dedicated remote system and workflow.
How AI Could Supercharge AR and VR
AI technologies and innovations are expected to unlock unprecedented experiences across AR and VR devices.
NeuroRadar: A Neuromorphic Radar Sensor for Low-Power IoT Systems
NeuroRadar provides a unique and innovative solution for radar sensing in energy-constrained IoT devices.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More