acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Consequences of Machine Intelligence
From ACM Opinion

The Consequences of Machine Intelligence

The question of what happens when machines get to be as intelligent as and even more intelligent than people seems to occupy many science-fiction writers.

Rapture of the Nerds: Will the Singularity Turn ­S Into Gods or End the Human Race?
From ACM Opinion

Rapture of the Nerds: Will the Singularity Turn ­S Into Gods or End the Human Race?

Hundreds of the world’s brightest minds—engineers from Google and IBM, hedge funds quants, and Defense Department contractors building artificial intelligence—were...

The Michigan Fight Song and Four Other Reasons to Avoid Internet Voting
From ACM Opinion

The Michigan Fight Song and Four Other Reasons to Avoid Internet Voting

In a Monday article, we described the security and reliability problems that have undermined public confidence in electronic voting machines within the United States...

Can We Trust Voting Machines?
From ACM Opinion

Can We Trust Voting Machines?

Last week, a congressional report claimed that using Chinese telecommunications companies’ goods and services in the United States could threaten national security...

Intel Strives to Develop Tiny Chips to Run Wearable Computers
From ACM TechNews

Intel Strives to Develop Tiny Chips to Run Wearable Computers

Intel researchers are developing tiny microprocessors that would power wearable computers. 

Keeping Technology Promises
From Communications of the ACM

Keeping Technology Promises

Considering new models for educational technology and methods.

Societal Implications of the Emerging Smart Grid
From Communications of the ACM

Societal Implications of the Emerging Smart Grid

Seeking solutions to concerns that go beyond the engineering of the smart grid.

Learning to Teach Computer Science
From Communications of the ACM

Learning to Teach Computer Science: The Need For a Methods Course

A multipronged approach to preparing computer science teachers is critical to success.

Decentralization Versus Centralization in IT Governance
From Communications of the ACM

Decentralization Versus Centralization in IT Governance

It's not as simple as you might think.

Oracle v. Google
From Communications of the ACM

Oracle v. Google: Are APIs Copyrightable?

Assessing the first phase of the trial based on claims that Google's Android platform infringes Oracle's Java-related copyrights and patents.

The Research Value of Publishing Attacks
From Communications of the ACM

The Research Value of Publishing Attacks

Security research can be improved by more effectively sharing what is learned from attacks on information systems.

Capitol Hill Rhetoric Takes Aim at Wrong Cybersecurity Targets
From ACM Opinion

Capitol Hill Rhetoric Takes Aim at Wrong Cybersecurity Targets

Defense secretary Leon Panetta couldn't resist, could he? He couldn't fight the urge to dig deep into the information security cliché handbook and yank out that...

Science in an Election Year
From ACM Opinion

Science in an Election Year

More than a dozen science and engineering organizations worked with ScienceDebate.org to draft 14 top science questions to ask the two main presidential candidates...

Meet a Science Committee that Doesn't Get Science
From ACM Opinion

Meet a Science Committee that Doesn't Get Science

In general, we only become aware of a politician's position on scientific issues during the campaign season. And, with a few exceptions like energy and climate...

And the Firewalls Came Tumbling Down
From ACM Opinion

And the Firewalls Came Tumbling Down

There's much to like about "This Machine Kills Secrets," Andy Greenberg's well-reported history of WikiLeaks and the many projects it has inspired, but one unintentionally...

Will Neuroscience Radically Transform the Legal System?
From ACM Opinion

Will Neuroscience Radically Transform the Legal System?

Although academic fields will often enjoy more than Andy Warhol's famous 15 minutes of fame, they too are subject to today's ever-hungry machinery of hype. Like...

How I Accidentally Helped Compromise the Secret Keys of High-Security Handcuffs
From ACM Opinion

How I Accidentally Helped Compromise the Secret Keys of High-Security Handcuffs

In the age of freely available modeling software, laser cutters and 3D printers, shapes that must stay secret for security's sake don't stay secret for long. Especially...

Where's the Discussion of Trojan Horses?
From ACM Opinion

Where's the Discussion of Trojan Horses?

The Mykonos Vase, discovered in 1961 in the Cyclades, is one of the earliest accounts of the Trojan Horse, used as a subterfuge by the Greeks to enter the city...

A Better Approach to Huawei, Zte, and Chinese Cyberspying? Distrust and Verify
From ACM Opinion

A Better Approach to Huawei, Zte, and Chinese Cyberspying? Distrust and Verify

In the wake of the 60-page report from Congress’s Select Committee On Intelligence recommending U.S. companies stop buying Chinese-made telecommunications gear...

Twitter: Who Do the Politicians Follow?
From ACM Opinion

Twitter: Who Do the Politicians Follow?

You can tell a lot about a politician's priorities from who they deign to follow on Twitter. When David Cameron joined the service on Saturday, he started out following...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account