Device Onboarding Using FDO and the Untrusted Installer Model
FDO’s untrusted model is contrasted with Wi-Fi Easy Connect to illustrate the advantages of each mechanism.
Advertisement
Device Onboarding Using FDO and the Untrusted Installer Model
FDO’s untrusted model is contrasted with Wi-Fi Easy Connect to illustrate the advantages of each mechanism.
Software Managers’ Guide to Operational Excellence
The secret to being a great engineering leader.
Improving Testing of Deep-Learning Systems
A combination of differential and mutation testing results in better test data.
Creating the First Confidential GPUs
The team at NVIDIA brings confidentiality and integrity to user code and data for accelerated computing.
Hardware VM Isolation in the Cloud
Enabling confidential computing with AMD SEV-SNP technology.
Confidential Computing: Elevating Cloud Security and Privacy
Working toward a more secure and innovative future.
DevEX: What Actually Drives Productivity
The developer-centric approach to measuring and improving productivity.
Best practices for open source ecosystems researchers.
Designing a Framework for Conversational Interfaces
Combining the latest advances in machine learning with earlier approaches.
Research for Practice: OS Scheduling
Better scheduling policies for modern computing systems.
Opportunity Cost and Missed Chances in Optimizing Cybersecurity
The loss of potential gain from other alternatives when one alternative is chosen.
Reinventing Backend Subsetting at Google
Designing an algorithm with reduced connection churn that could replace deterministic subsetting.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More