Validating Factual Personal Information. Why Bother Localizing Information Technology Products? Algorithmic Advance: The Group Isomorphism Problem. Teaching Transformed. Virtual Reality as Therapy. Autocorrect Is Not: People Are Multilingual and Computer Science Should Be Too. Leveraging Professional Ethics for Responsible AI. How the AI Boom Went Bust. Dear Diary. Undergraduate Computer Science Curricula. Virtual and the Future of Conferences. Gaining Benefit from Artificial Intelligence and Data Science: A Three-Part Framework. Security Mismatch. Knowing What You Need to Know. Inherent Limitations of AI Fairness. Computing Education in the Era of Generative AI. Talking about Large Language Models. Anthropomorphism and Human-Robot Interaction. Energy and Emissions of Machine Learning on Smartphones vs. the Cloud. How Easy Is It to Describe Hard Polynomials?: Technical Perspective. Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits. Bridging AI with Real-Time Systems: Technical Perspective. Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines. The Human Touch. Computing, You Have Blood on Your Hands! From Eye Tracking to AI-Powered Learning. Protecting Life-Saving Medical Devices from Cyberattack. Epigenomics Now: Computer power helps biologists track the regulation of genetic information. AT THE VANGUARD OF HEALTH-TECH AND AGE-TECH. Why Are Lawyers Afraid of AI? Generative artificial intelligence and the law: there is no turning back. Wayfinding Without GPS: Quantum entanglement provides a new direction in navigation. ACM Publications Finances for 2022: Striving for Balance between Mission, Sustainability, and Growth. Data Bias Management: Envisioning a unique approach toward bias and fairness research. NVIDIA at the Center of the Generative AI Ecosystem--For Now: Assessing the ascent of NVIDIA. Beyond the Editorial Analogy: The Future of the First Amendment on the Internet: Can the government regulate how social media companies moderate their platforms? The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers: Seeking more secure and effective digital representations. Toward a Solid Acceptance of the Decentralized Web of Personal Data: Societal and Technological Convergence: Giving individuals more control of their personal data. Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research: Demystifying rebuttal writing. Achievement in Microarchitecture. Confidential Computing: Elevating Cloud Security and Privacy. Hardware VM Isolation in the Cloud. Creating the First Confidential GPUs. Why Should I Trust Your Code? 10 Things Software Developers Should Learn about Learning. What Should We Do when Our Ideas of Fairness Conflict? On Specifying for Trustworthiness. Shortcut Learning of Large Language Models in Natural Language Understanding. The User as a Key Ingredient in AAC Design. Nonverbal Communication through Expressive Objects. Seesaw Gold: Tilting for treasure.