Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Running the “Reflections on Trusting Trust” Compiler: Revisiting Ken Thompson’s sourceless backdoor

35th ACM SIGPLAN International Conference on Compiler Construction (CC 2026)

What Every Experimenter Must Know About Randomization

Finding forall-exists Hyperbugs using Symbolic Execution

Language Protection by Trademark ill-advised (Communications of the ACM Volume 11, Issue 3, 1968) 😂

FlashAttention-T: Towards Tensorized Attention

OpenClaw is basically a cascade of LLMs in prime position to mess stuff up

ACM Is Now Open Access

Eloquent: Improving Text Editing on Mobile (2021)

Dev-owned testing: Why it fails in practice and succeeds in theory

The five orders of ignorance (2000)

There is No Now – Problems with simultaneity in distributed systems

Why are mobile apps not asking for consent for analytics data collection?

How training AI became the real race

Linear Address Spaces: Unsafe at any speed (2022)

Beginning January 2026, all ACM publications will be made open access

Why the Internet Is Bad for Democracy (2005)

The World Is Not A Desktop (1994)

Oasis: Pooling PCIe Devices over CXL to Boost Utilization

Kernel Float: Unlocking Mixed-Precision GPU Programming

Memory Safety for Skeptics

An MLIR pipeline for offloading Fortran to FPGAs via OpenMP

Optimizations in C++ compilers: a practical journey

Practical Security in Production

Researchers use deep learning surrogate model to create the first Milky Way simulation model that tracks over 100 billion stars individually.

Domain-specific Languages and Code Synthesis Using Haskell

Using an Array of Needles to Create Solid Knitted Shapes

A Practical Guide to Transitioning to Memory-Safe Languages

The Silent Scientist: When Software Research Fails to Reach Its Audience

CodeSummit 2.O: National-Level Coding Competition

More →