acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Search Top Secret America's Database of Private Spooks
From ACM Opinion

Search Top Secret America's Database of Private Spooks

Figuring out exactly who's cashing in on the post-9/11 boom in secret programs just got a whole lot easier.

From ACM Opinion

The Google Algorithm

Google handles nearly two-thirds of Internet search queries worldwide. Analysts reckon that most Web sites rely on the search engine for half of their traffic....

What Apple Must Do to Stop the Iphone 4 Bleeding
From ACM Opinion

What Apple Must Do to Stop the Iphone 4 Bleeding

It'd be an understatement to say that this has been a terrible week for Apple, and we haven't even reached the halfway point.

From ACM Opinion

Google Should Answer Some Searching Questions

Google woos people with its "don't be evil" slogan and assures us that everything it does is meant to enhance our online experience. But a new study by U.S. advocacy...

Threat of 'cyberwar' Has Been Hugely Hyped
From ACM Opinion

Threat of 'cyberwar' Has Been Hugely Hyped

There's a power struggle going on in the U.S. government right now. It's about who is in charge of cyber security, and how much control the government will exert...

From ACM Opinion

How E-Maps Curtail Our Freedom

Electronic maps are arguably the quintessential innovation of 20th-century cartography. Although a few academic cartographers accord the map mystical powers, it...

From ACM Opinion

Wikileaks Fails "due Diligence" Review

In the past week, both the Washington Post and the New York Times have referred to WikiLeaks.org, the web site that publishes confidential records, as a "whistleblower"...

From ACM Opinion

Are Cells the New Cigarettes?

The great cosmic joke would be to find out definitively that the advances we thought were blessings--from the hormones women pump into their bodies all their lives...

Advice to Members Seeking ACM Distinction
From Communications of the ACM

Advice to Members Seeking ACM Distinction

ACM's Distinguished Member Recognition Program recognizes members in three categories: Educator, Engineer, and Scientist. Each category...

Cultivating Cultural Diversity in Information Technology
From Communications of the ACM

Cultivating Cultural Diversity in Information Technology

Introducing CMD-IT, a new center focused on synergistic activities related to ethnic minorities and people with disabilities.

Should the Google Book Settlement Be Approved?
From Communications of the ACM

Should the Google Book Settlement Be Approved?

Considering the precedent that could be established by approval of the controversial Google book settlement.

Work Life in the Robotic Age
From Communications of the ACM

Work Life in the Robotic Age

Technological change results in changes in expectations, in this case affecting the workplace.

Outsourcing Versus Shared Services
From Communications of the ACM

Outsourcing Versus Shared Services

Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.

Against Instant Replay
From ACM Opinion

Against Instant Replay

Extraordinary cases make bad law. In a sense, Armando Galarraga’s non-perfect perfect game, spoiled by an umpire’s call on what should have been the 27th out, offers...

Institutional Review Boards and Your Research
From Communications of the ACM

Institutional Review Boards and Your Research

Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...

Intel's Rebates: Above Board or Below the Belt?
From Communications of the ACM

Intel's Rebates: Above Board or Below the Belt?

Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...

Privacy By Design: Moving From Art to Practice
From Communications of the ACM

Privacy By Design: Moving From Art to Practice

Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...

Myths and Fallacies of 'Personally Identifiable Information'
From Communications of the ACM

Myths and Fallacies of 'Personally Identifiable Information'

Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...

How the ­.s. Military Can Win the Robotic Revolution
From ACM Opinion

How the ­.s. Military Can Win the Robotic Revolution

One of the great conundrums of war and technology is the odd fact that there is no such thing as a permanent first-mover advantage.

The Cyborg Insects Are Coming!
From ACM Opinion

The Cyborg Insects Are Coming!

Telepathic helmets. Grid-computing swarms of cyborg insects, some for surveillance, some with lethal stingers. New cognitive-enhancement drugs. (What? AdderallProvigil...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account