acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

10 Years On, Gmail Has Transformed the Web as We Know It
From ACM Opinion

10 Years On, Gmail Has Transformed the Web as We Know It

Google loves to unveil a good gag product on April Fool's Day.

A Close Look at the Nsa's Most Powerful Internet Attack Tool
From ACM Opinion

A Close Look at the Nsa's Most Powerful Internet Attack Tool

We already knew that the NSA has weaponized the Internet, enabling it to "shoot" exploits at anyone it desires.

Why You Should Embrace Surveillance, Not Fight It
From ACM Opinion

Why You Should Embrace Surveillance, Not Fight It

I once worked with Steven Spielberg on the development of Minority Report, derived from the short story by Philip K. Dick featuring a future society that uses surveillance...

At Sxsw, the Next Big Thing May Be No Thing at All
From ACM Opinion

At Sxsw, the Next Big Thing May Be No Thing at All

Every year, just before South by Southwest Interactive starts, the froth starts churning. Everybody begins wondering what this year’s breakout hit app will be.

Why Copyrighted Coffee May Cripple the Internet of Things
From ACM Opinion

Why Copyrighted Coffee May Cripple the Internet of Things

With its single-serving coffee pods, Green Mountain Coffee has transformed the business of brew.

This Ingenious Touchscreen ­i Should Be in Every Car
From ACM Opinion

This Ingenious Touchscreen ­i Should Be in Every Car

There may be no greater design crime today than putting a touchscreen in an automobile.

Jawbone Is Now the Startup Apple Should Fear Most
From ACM Opinion

Jawbone Is Now the Startup Apple Should Fear Most

Jawbone is ascending into the top echelon of tech startups, joining the likes of Uber, Dropbox, and Square.

The Strange, Deadly Effects Mars Would Have on Your Body
From ACM Opinion

The Strange, Deadly Effects Mars Would Have on Your Body

We've imagined sending people to Mars since well before Gagarin's first spaceflight.

How to Create the Perfect Online Dating Profile, in 25 Infographics
From ACM Opinion

How to Create the Perfect Online Dating Profile, in 25 Infographics

Every day, millions of singles crawl dating sites and apps, flipping through photos and profiles of potential matches.

Judges Poised to Hand ­.s. Spies the Keys to the Internet
From ACM Opinion

Judges Poised to Hand ­.s. Spies the Keys to the Internet

How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites?

I Spent Two Hours Talking With the Nsa's Bigwigs. Here's What Has Them Mad
From ACM Opinion

I Spent Two Hours Talking With the Nsa's Bigwigs. Here's What Has Them Mad

My expectations were low when I asked the National Security Agency to cooperate with my story on the impact of Edward Snowden’s leaks on the tech industry.

The Internet of Things Is Wildly Insecure—and Often ­npatchable
From ACM Opinion

The Internet of Things Is Wildly Insecure—and Often ­npatchable

We're at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself—as with the Internet of Things...

I, Glasshole: My Year With Google Glass
From ACM Opinion

I, Glasshole: My Year With Google Glass

An anecdote: I wanted to wear Google Glass during the birth of our second child.

Falling in Love with AI Virtual Assistants: A Creepy Love Affair Nearer Than You Think
From ACM Opinion

Falling in Love with AI Virtual Assistants: A Creepy Love Affair Nearer Than You Think

"I've never loved anyone the way I've loved you," swoons Joaquin Phoenix, in the movie Her.

Software Is Reorganizing the World
From ACM Opinion

Software Is Reorganizing the World

For the first time in memory, adults in the United States under age forty are now expected to be poorer than their parents.

Our Government Has Weaponized the Internet. Here's How They Did It
From ACM Opinion

Our Government Has Weaponized the Internet. Here's How They Did It

The internet backbone—the infrastructure of networks upon which internet traffic travels—went from being a passive infrastructure for communication to an active...

How to Design—and Defend Against—the Perfect Security Backdoor
From ACM Opinion

How to Design—and Defend Against—the Perfect Security Backdoor

We already know the NSA wants to eavesdrop on the Internet. 

Want to Evade Nsa Spying? Don't Connect to the Internet
From ACM Opinion

Want to Evade Nsa Spying? Don't Connect to the Internet

Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA.

Google in Jeopardy: What If IBM's Watson Dethroned the King of Search?
From ACM Opinion

Google in Jeopardy: What If IBM's Watson Dethroned the King of Search?

Remember Watson, IBM's Jeopardy! champion?

How Ios 7 Will Spark a Boom in App Design
From ACM Opinion

How Ios 7 Will Spark a Boom in App Design

You probably feel strongly about iOS 7.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account