acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Tech Companies Can Blame Snowden For Data Privacy Decision
From ACM Opinion

Tech Companies Can Blame Snowden For Data Privacy Decision

A ruling the Europe Union’s highest court yesterday may create enormous headaches for US tech companies like Google and Facebook.

We're on the Brink of a Revolution in Crazy-Smart Digital Assistants
From ACM Opinion

We're on the Brink of a Revolution in Crazy-Smart Digital Assistants

Here's a quick story you’ve probably heard before, followed by one you probably haven't.

You Can't ­nderstand Security Without These Classic Works
From ACM Opinion

You Can't ­nderstand Security Without These Classic Works

There are seminal books, movies, articles, and more that you've been meaning to get to but just haven't made the time for.

Why I'm Addicted to Browsing Sepia Photos of Old-School Nyc
From ACM Opinion

Why I'm Addicted to Browsing Sepia Photos of Old-School Nyc

It's not a game or social media site, but OldNYC.org is as addictive as Angry Birds and as time consuming as Facebook.

Google's Search ­pdated Will Remake the Web in Its Own Image
From ACM News

Google's Search ­pdated Will Remake the Web in Its Own Image

Some people are calling it Mobilegeddon.

Why Cheap Cameras and Boring Sensors Make the Best Smart Home Stuff
From ACM Opinion

Why Cheap Cameras and Boring Sensors Make the Best Smart Home Stuff

The twin fixations of CES this year are, to no one's surprise, wearable technology and the internet of things.

The Data Centers of Tomorrow Will ­se the Same Tech Our Phones Do
From ACM Opinion

The Data Centers of Tomorrow Will ­se the Same Tech Our Phones Do

The mobile revolution has spread beyond the mini supercomputers in our hands all the way to the data center.

Glenn Greenwald's Pulse-Pounding Tale of Breaking the Snowden Leaks
From ACM Opinion

Glenn Greenwald's Pulse-Pounding Tale of Breaking the Snowden Leaks

In June 2013, Edward Snowden was sitting in his room at the Mira hotel in Hong Kong, watching the world react to the first of his explosive leaks about the NSA's...

10 Years On, Gmail Has Transformed the Web as We Know It
From ACM Opinion

10 Years On, Gmail Has Transformed the Web as We Know It

Google loves to unveil a good gag product on April Fool's Day.

A Close Look at the Nsa's Most Powerful Internet Attack Tool
From ACM Opinion

A Close Look at the Nsa's Most Powerful Internet Attack Tool

We already knew that the NSA has weaponized the Internet, enabling it to "shoot" exploits at anyone it desires.

Why You Should Embrace Surveillance, Not Fight It
From ACM Opinion

Why You Should Embrace Surveillance, Not Fight It

I once worked with Steven Spielberg on the development of Minority Report, derived from the short story by Philip K. Dick featuring a future society that uses surveillance...

This Ingenious Touchscreen ­i Should Be in Every Car
From ACM Opinion

This Ingenious Touchscreen ­i Should Be in Every Car

There may be no greater design crime today than putting a touchscreen in an automobile.

Our Government Has Weaponized the Internet. Here's How They Did It
From ACM Opinion

Our Government Has Weaponized the Internet. Here's How They Did It

The internet backbone—the infrastructure of networks upon which internet traffic travels—went from being a passive infrastructure for communication to an active...

How to Design—and Defend Against—the Perfect Security Backdoor
From ACM Opinion

How to Design—and Defend Against—the Perfect Security Backdoor

We already know the NSA wants to eavesdrop on the Internet. 

How Ios 7 Will Spark a Boom in App Design
From ACM Opinion

How Ios 7 Will Spark a Boom in App Design

You probably feel strongly about iOS 7.

How Advanced Is the NSA's Cryptanalysis—And Can We Resist It?
From ACM Opinion

How Advanced Is the NSA's Cryptanalysis—And Can We Resist It?

The latest Snowden document is the U.S. intelligence "black budget."

Phew, Nsa Is Just Collecting Metadata. (you Should Still Worry)
From ACM Opinion

Phew, Nsa Is Just Collecting Metadata. (you Should Still Worry)

We now know that every day, U.S. phone companies quietly send the government a list of who called whom and when—"telephony metadata"—for every call made on their...

Connecting the Dots on Prism, Phone Surveillance, and the Nsa's Massive Spy Center
From ACM Opinion

Connecting the Dots on Prism, Phone Surveillance, and the Nsa's Massive Spy Center

Physically, the NSA has always been well protected by miles of high fences and electrified wire, thousands of cameras, and gun-toting guards.

You'll Never Believe the Data 'wiped' Smartphones Store
From ACM Opinion

You'll Never Believe the Data 'wiped' Smartphones Store

Few things are more precious, intimate, and personal than the data on your smartphone.

Why It's Time For Our Devices to ­nderstand What We Mean, Not Just What We Say
From ACM Opinion

Why It's Time For Our Devices to ­nderstand What We Mean, Not Just What We Say

It wasn’t just cost and Moore’s law. The graphical user interface—now known as the GUI ("gooey")—is what really made computing widespread, personal and ubiquitous...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account