Device Onboarding Using FDO and the Untrusted Installer Model
FDO’s untrusted model is contrasted with Wi-Fi Easy Connect to illustrate the advantages of each mechanism.
Device Onboarding Using FDO and the Untrusted Installer Model
FDO’s untrusted model is contrasted with Wi-Fi Easy Connect to illustrate the advantages of each mechanism.
Software Managers’ Guide to Operational Excellence
The secret to being a great engineering leader.
Improving Testing of Deep-Learning Systems
A combination of differential and mutation testing results in better test data.
In the post-pandemic world, businesses are often handling a combination of on-site and remote workers. To be successful, this requires a new set of management tools.
In software companies a natural conflict exists between security teams and product delivery teams—one's nature is to slow down progress, the other wants to speed it up. The secret is to view security as an enabler, not a hindrance.
Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
Creating the First Confidential GPUs
The team at NVIDIA brings confidentiality and integrity to user code and data for accelerated computing.
Confidential Computing: Elevating Cloud Security and Privacy
Working toward a more secure and innovative future.
DevEX: What Actually Drives Productivity
The developer-centric approach to measuring and improving productivity.
Designing a Framework for Conversational Interfaces
Combining the latest advances in machine learning with earlier approaches.
A discussion with Alfred Spector, Peter Norvig, Chris Wiggins, Jeannette Wing, Ben Fried, and Michael Tingley.
Opportunity Cost and Missed Chances in Optimizing Cybersecurity
The loss of potential gain from other alternatives when one alternative is chosen.
Reinventing Backend Subsetting at Google
Designing an algorithm with reduced connection churn that could replace deterministic subsetting.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More