acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Not Seeing the Crime For the Cameras?
From Communications of the ACM

Not Seeing the Crime For the Cameras?

Why it is difficult — but essential — to monitor the effectiveness of security technologies.

Q&A: Researcher Karsten Nohl on Mobile Eavesdropping
From ACM Opinion

Q&A: Researcher Karsten Nohl on Mobile Eavesdropping

Last week brought some bad news for mobile phone users. German security expert Karsten Nohl demonstrated how easy it is to eavesdrop on GSM-based (Global System...

Is Aviation Security Mostly For Show?
From ACM Opinion

Is Aviation Security Mostly For Show?

Last week's attempted terror attack on an airplane heading from Amsterdam to Detroit has given rise to a bunch of familiar questions. How did the explosives get...

From ACM Opinion

TSA To Save Print Media? No Electronics On International Flights? What A Joke.

With the caveat that the U.S. Transportation Security Administration has yet to confirm any of this on its Web site, there are several indications that orders have...

The Evolution of Platform Thinking
From Communications of the ACM

The Evolution of Platform Thinking

How platform adoption can be an important determinant of product and technological success.

From ACM Opinion

A Cynic

On July 17, 2008, Senator Barack Obama held a town hall meeting on national security at Purdue University. He and his panel covered issues of nuclear, biological...

From ACM Opinion

Connecting with an Internet Pioneer, 40 Years Later

Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...

Broken Builds
From Communications of the ACM

Broken Builds

Frequent broken builds could be symptomatic of deeper problems within a development project.

Computing's Paradigm
From Communications of the ACM

Computing's Paradigm

Trying to categorize computing as engineering, science, or math is fruitless; we have our own paradigm.

Israel's Technology Industry as an Economic Growth Engine
From Communications of the ACM

Israel's Technology Industry as an Economic Growth Engine

How government-industry collaboration can have far-reaching economic influences.

Opening Remarks
From Communications of the ACM

Opening Remarks

Highlighting efforts and providing the rationale to increase the participation and success of underrepresented groups in computing.

Next Siggest Security Threat Will Be Cyber-Terrorism
From ACM Opinion

Next Siggest Security Threat Will Be Cyber-Terrorism

The next biggest security threat may not be AK 47s or bomb blasts, but cyber terrorism. Terrorists can attack their enemy without stepping out of their home or...

Report: Cyberterror Not a Credible Threat
From ACM Opinion

Report: Cyberterror Not a Credible Threat

A new report by a Washington policy think tank dismisses out of hand the idea that terrorist groups are currently launching cyber attacks and says that the recent...

On Public Service and Computer Science
From Communications of the ACM

On Public Service and Computer Science

Members of the computer science community should become more involved in public service by becoming program managers at federal agencies, the opportunities and...

The Broadband Price Is Not Right
From Communications of the ACM

The Broadband Price Is Not Right

Developing an effective pricing index is essential to understanding the value of broadband connectivity.

Are Business Methods Patentable?
From Communications of the ACM

Are Business Methods Patentable?

How the U.S. Supreme Court's forthcoming decision in the Bilski v. Doll case is expected to affect existing and future software patents.

Usable Security: How to Get It
From Communications of the ACM

Usable Security: How to Get It

Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important...

From ACM TechNews

­.s. Must Focus on Protecting Critical Computer Networks From Cyber Attack

A study from the RAND Corp. suggests the United States should focus on defending critical civilian and military computer networks from cyberattack, but does not...

From ACM CareerNews

Government Should Help Widen Cyber Knowledge

The U.S. Department of Homeland Security should be doing more to recruit top cyber security talent and develop a highly skilled workforce of cyber security workers...

From ACM Opinion

Should Operating Systems Be Intuitive?

Should computers be intuitive, requiring little to no learning or thinking? Is it even possible for them to be so? “Nothing is intuitive,” said Slashdot blogger...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account