acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

There's No Good Reason to Trust Blockchain Technology
From ACM Opinion

There's No Good Reason to Trust Blockchain Technology

In his 2008 white paper that first proposed bitcoin, the anonymous Satoshi Nakamoto concluded with: "We have proposed a system for electronic transactions without...

How Silicon Valley Puts the 'Con' in Consent
From ACM Opinion

How Silicon Valley Puts the 'Con' in Consent

The average person would have to spend 76 working days reading all of the digital privacy policies they agree to in the span of a year. Reading Amazon's terms and...

People Don't Trust Blockchain Systems. Is Regulation a Way to Help?
From ACM Opinion

People Don't Trust Blockchain Systems. Is Regulation a Way to Help?

Blockchain technology isn't as widely used as it could be, largely because blockchain users don't trust each other, as research shows.

Do We Really Need Computational Thinking?
From Communications of the ACM

Do We Really Need Computational Thinking?

Considering the expression "computational thinking" as an entry point to understand why the fundamental contribution of computing to science is the shift from solving...

How Computer Science at CMU Is Attracting and Retaining Women
From Communications of the ACM

How Computer Science at CMU Is Attracting and Retaining Women

Carnegie Mellon University's successful efforts enrolling, sustaining, and graduating women in computer science challenge the belief in a gender divide in CS education...

The Roger Stone Indictment Shows a Conspiratorial Comedy of Opsec Errors
From ACM Opinion

The Roger Stone Indictment Shows a Conspiratorial Comedy of Opsec Errors

Former Trump advisor and self-proclaimed "dirty trickster" Roger Stone—the man with a Richard Nixon tattoo on his back and a penchant for playing the evil genius—was...

Five Emerging Cyber-Threats to Worry About in 2019
From ACM Opinion

Five Emerging Cyber-Threats to Worry About in 2019

Last year was full of cybersecurity disasters, from the revelation of security flaws in billions of microchips to massive data breaches and attacks using malicious...

The Quiet Threat Inside 'Internet of Things' Devices
From ACM Opinion

The Quiet Threat Inside 'Internet of Things' Devices

As Americans increasingly buy and install smart devices in their homes, all those cheap interconnected devices create new security problems for individuals and...

When Chinese Hackers Declared War on the Rest of ­s
From ACM Opinion

When Chinese Hackers Declared War on the Rest of ­s

Late one Wednesday in March 2015, an alarm sounded in the offices of GitHub, a San Francisco-based software firm. The company's offices exemplified the kind of...

Dreaming of Death Rays: The Search for Laser Weapons
From ACM Opinion

Dreaming of Death Rays: The Search for Laser Weapons

Lasers first emerged nearly 60 years ago, but the idea of using powerful beams of heat or light is hardly new.

Countering Russian Disinformation the Baltic Nations' Way
From ACM News

Countering Russian Disinformation the Baltic Nations' Way

As the new Congress begins, it will soon discuss the comprehensive reports to the U.S. Senate on the disinformation campaign of half-truths, outright fabrications...

Never Mind Killer Robots; Here Are Six Real AI Dangers to Watch Out for in 2019
From ACM Opinion

Never Mind Killer Robots; Here Are Six Real AI Dangers to Watch Out for in 2019

Once it was fashionable to fret about the prospect of super-intelligent machines taking over the world. The past year showed that AI may cause all sorts of hazards...

A Reason to Despair About the Digital Future: Deepfakes
From ACM Opinion

A Reason to Despair About the Digital Future: Deepfakes

A despairing prediction for the digital future came from an unlikely source recently. Speaking of "deepfakes," or media manipulated through artificial intelligence...

Tor Is Easier Than Ever. Time to Give It a Try
From ACM Opinion

Tor Is Easier Than Ever. Time to Give It a Try

You probably know about the digital anonymity service Tor, but for whatever reason you may not actually use it.

How Russia ­sed the Internet to Perfect Its Dark Arts
From ACM Opinion

How Russia ­sed the Internet to Perfect Its Dark Arts

Imagine American politics for a moment as a laboratory experiment. A foreign adversary (let's call it "Russia") begins to play with the subjects, using carrots...

The Tech That Was Fixed in 2018 and the Tech That Still Needs Fixing
From ACM Opinion

The Tech That Was Fixed in 2018 and the Tech That Still Needs Fixing

Personal technology was so awful this year that nobody would think you were paranoid if you dug a hole and buried your computer, phone and smart speaker under six...

How China Got a Head Start in Fintech, and Why the West Won't Catch ­p
From ACM Opinion

How China Got a Head Start in Fintech, and Why the West Won't Catch ­p

In 2013 I moved from Paris to Beijing to study China's financial system. I stayed for two years and became fluent enough to translate economics books from Mandarin...

The Search for Anti-Conservative Bias on Google
From ACM Opinion

The Search for Anti-Conservative Bias on Google

Last Wednesday, a day after Google's C.E.O., Sundar Pichai, sat before the House Judiciary Committee to answer questions about the company's search engine,Donald...

Google Isn't the Company that We Should Have Handed the Web Over To
From ACM Opinion

Google Isn't the Company that We Should Have Handed the Web Over To

With Microsoft's decision to end development of its own Web rendering engine and switch to Chromium, control over the Web has functionally been ceded to Google....

UCF's 30-Year REU Site in Computer Vision
From Communications of the ACM

UCF's 30-Year REU Site in Computer Vision

A unique perspective on experiences encouraging students to focus on further education.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account