acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

How Steve Jobs Made the Ipad Succeed When All Other Tablets Failed
From ACM Opinion

How Steve Jobs Made the Ipad Succeed When All Other Tablets Failed

Steve Jobs's solution to Google's Android-everywhere strategy was simple and audacious: he unveiled the iPad.

How to Design—and Defend Against—the Perfect Security Backdoor
From ACM Opinion

How to Design—and Defend Against—the Perfect Security Backdoor

We already know the NSA wants to eavesdrop on the Internet. 

Want to Evade Nsa Spying? Don't Connect to the Internet
From ACM Opinion

Want to Evade Nsa Spying? Don't Connect to the Internet

Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA.

Google in Jeopardy: What If IBM's Watson Dethroned the King of Search?
From ACM Opinion

Google in Jeopardy: What If IBM's Watson Dethroned the King of Search?

Remember Watson, IBM's Jeopardy! champion?

Why Free Software Is More Important Now Than Ever Before
From ACM Opinion

Why Free Software Is More Important Now Than Ever Before

It is now 30 years since I launched the campaign for freedom in computing, that is, for software to be free or "libre" (we use that word to emphasize that we're...

Forget Foreign Languages and Music. Teach Our Kids to Code
From ACM Opinion

Forget Foreign Languages and Music. Teach Our Kids to Code

J. Paul Gibson began to teach programming classes for teens out of frustration.

How Ios 7 Will Spark a Boom in App Design
From ACM Opinion

How Ios 7 Will Spark a Boom in App Design

You probably feel strongly about iOS 7.

If the New Iphone Has Fingerprint Authentication, Can It Be Hacked?
From ACM Opinion

If the New Iphone Has Fingerprint Authentication, Can It Be Hacked?

When Apple bought AuthenTec for its biometrics technology—reported as one of its most expensive purchases—there was a lot of speculation about how the company would...

How Advanced Is the NSA's Cryptanalysis—And Can We Resist It?
From ACM Opinion

How Advanced Is the NSA's Cryptanalysis—And Can We Resist It?

The latest Snowden document is the U.S. intelligence "black budget."

How Protecting Your Privacy Could Make You the Bad Guy
From ACM Opinion

How Protecting Your Privacy Could Make You the Bad Guy

There's a funny catch-22 when it comes to privacy best practices.

Your Creative, Open Hackathon Is Ripe For Legal Challenges
From ACM Opinion

Your Creative, Open Hackathon Is Ripe For Legal Challenges

NASA's Space Apps Challenge recently became the world's largest open hackathon, with over 8,000 participants spanning 44 countries.

Phew, Nsa Is Just Collecting Metadata. (you Should Still Worry)
From ACM Opinion

Phew, Nsa Is Just Collecting Metadata. (you Should Still Worry)

We now know that every day, U.S. phone companies quietly send the government a list of who called whom and when—"telephony metadata"—for every call made on their...

Connecting the Dots on Prism, Phone Surveillance, and the Nsa's Massive Spy Center
From ACM Opinion

Connecting the Dots on Prism, Phone Surveillance, and the Nsa's Massive Spy Center

Physically, the NSA has always been well protected by miles of high fences and electrified wire, thousands of cameras, and gun-toting guards.

Forget Google Glass. These Are the Interfaces of the Future
From ACM Opinion

Forget Google Glass. These Are the Interfaces of the Future

When we talk about design nowadays, the focus has been on the lures (or dangers) of flat design and skeumorphism; whether there should be (or really are any) ...

Welcome to Google Island
From ACM Opinion

Welcome to Google Island

I awoke aboard a boat, just before daybreak, which was weird.

Jaron Lanier on the Cheap Treats and Religious Emotion of Moore's Law
From ACM Opinion

Jaron Lanier on the Cheap Treats and Religious Emotion of Moore's Law

Moore's Law is Silicon Valley’s guiding principle, like all 10 commandments wrapped into one.

Why iPhone Accessory Makers Love Bluetooth
From ACM Careers

Why iPhone Accessory Makers Love Bluetooth

Apple's closed ecosystem is losing the battle for how we connect our mobile devices to accessories as open solutions like Bluetooth dominate over Apple's proprietary...

Why We Often View Digital Culture Through Insect Metaphors
From ACM Opinion

Why We Often View Digital Culture Through Insect Metaphors

Swarms. Hive minds. The Web.

It's Not About New Icons: What Jony Ive Needs to Do For Apple's Ios
From ACM Opinion

It's Not About New Icons: What Jony Ive Needs to Do For Apple's Ios

iOS 7 will be flat, as in flat design.

#freejahar Hashtag Rallies Emerging Cult of Boston Bomb Suspect
From ACM Opinion

#freejahar Hashtag Rallies Emerging Cult of Boston Bomb Suspect

Barely two days after cops apprehended Suspect #2 in the Boston Marathon bombings, supporters of Dzhokhar Tsarnaev are rallying online.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account