acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Why Attack When We Can't Defend?
From ACM Opinion

Why Attack When We Can't Defend?

In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...

The Flight From Conversation
From ACM Opinion

The Flight From Conversation

We live in a technological universe in which we are always communicating. And yet we have sacrificed conversation for mere connection.

Following the Breadcrumbs on the Data-Sharing Trail
From ACM Opinion

Following the Breadcrumbs on the Data-Sharing Trail

Would you like to donate to the Obama campaign? Sign up for a college course? Or maybe subscribe to Architectural Digest? 

How China Steals Our Secrets
From ACM Opinion

How China Steals Our Secrets

For the last two months, senior government officials and private-sector experts have paraded before Congress and described in alarming terms a silent threat: cyberattacks...

Tv Makers Ignore Apps at Their Own Peril
From ACM Opinion

Tv Makers Ignore Apps at Their Own Peril

Every night, I get home from work, drop onto the couch and sit there surfing the Web or watching videos on my 3 1/2-inch iPhone screen. My big-screen HDTV sits...

From ACM Opinion

Apple's Mountain Lion Makes the Mac More Like the Ipad

Apple's iPhones and iPads get most of the attention, but Apple is now directing the spotlight on the Mac.

A High-Tech War on Leaks
From ACM Opinion

A High-Tech War on Leaks

Back in 2006, before the Obama administration made leak prosecutions routine, a panel of three federal appeals court judges in New York struggled to decide whether...

Erasing the Boundaries
From ACM Opinion

Erasing the Boundaries

Technology used to be so simple.

Beyond Sopa
From ACM Opinion

Beyond Sopa

We welcomed the collapse this month of two flawed bills to prevent online piracy, bills that could have stifled speech and undermined Internet safety. But piracy...

Building the Team That Built Watson
From ACM Opinion

Building the Team That Built Watson

The assignment was one of the biggest challenges in the field of artificial intelligence: build a computer smart enough to beat grand champions at the game of...

From ACM Opinion

The Future of Moral Machines

A robot walks into a bar and says, "I’ll have a screwdriver." A bad joke, indeed. But even less funny if the robot says "Give me what’s in your cash register."...

From ACM Opinion

Patents and the Public Interest

Next week, in a case closely watched both by analysts and retailers, the International Trade Commission will decide whether the handset maker HTC should be allowed...

From ACM Opinion

The Court's Gps Test

There were no GPS tracking devices when the framers wrote the Fourth Amendment’s prohibition against unreasonable searches. But that does not mean this sometimes...

From ACM Opinion

The Genius of Jobs

One of the questions I wrestled with when writing about Steve Jobs was how smart he was. On the surface, this should not have been much of an issue.

From ACM News

The Auteur vs. the Committee

At Apple, one is the magic number.

From ACM News

Decoding Your Email Personality

Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...

From ACM Opinion

Internet Piracy and How to Stop It

Online piracy is a huge business. A recent study found that Web sites offering pirated digital content or counterfeit goods, like illicit movie downloads or bootleg...

One on One: Jaron Lanier
From ACM Opinion

One on One: Jaron Lanier

Jaron Lanier, a partner architect at Microsoft Research, has had a long and varied career in technology. Mr. Lanier popularized the term "virtual reality" in...

There's No Data Sheriff on the Wild Web
From ACM Opinion

There's No Data Sheriff on the Wild Web

A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...

Data Privacy, Put to the Test
From ACM News

Data Privacy, Put to the Test

To the catalog of corporate "bigs" that worry a lot of us little people, add this: Big Data.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account