acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

A Creator of Skynet Ponders Google
From ACM Opinion

A Creator of Skynet Ponders Google

After an eight-year detour in which he served as governor of California, Arnold Schwarzenegger has returned to his true calling as a cyborg assassin.

Pluto Wins
From ACM Opinion

Pluto Wins

It's time to stop throwing pity parties for Pluto.

The Case of the Hacked Refrigerator—could 'the Internet of Things' Connect Everything?
From ACM Opinion

The Case of the Hacked Refrigerator—could 'the Internet of Things' Connect Everything?

Somebody hacked a refrigerator recently, and it could mark a tipping point for civilization.

Bitcoin: How Its Core Technology Will Change the World
From ACM Opinion

Bitcoin: How Its Core Technology Will Change the World

Bitcoin has been called many things, from the future of money to a drug dealer's dream and everything else in between.

How to Create the Perfect Online Dating Profile, in 25 Infographics
From ACM Opinion

How to Create the Perfect Online Dating Profile, in 25 Infographics

Every day, millions of singles crawl dating sites and apps, flipping through photos and profiles of potential matches.

Why Google Kept Motorola's Research Lab
From ACM Opinion

Why Google Kept Motorola's Research Lab

Google's $2.9 billion sale of Motorola Mobility to Chinese PC maker Lenovo might seem like lousy business, given Google's $12.5 billion purchase in 2012 and losses...

Microsoft Ceo Nadella's Top Challenge: Figuring Out Mobile
From ACM Opinion

Microsoft Ceo Nadella's Top Challenge: Figuring Out Mobile

Microsoft stands at a crossroads when it comes to mobile.

Judges Poised to Hand ­.s. Spies the Keys to the Internet
From ACM Opinion

Judges Poised to Hand ­.s. Spies the Keys to the Internet

How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites?

Through a Face Scanner Darkly
From ACM Opinion

Through a Face Scanner Darkly

Anonymity forms a protective casing.

The Lost Ancestors of Ascii Art
From ACM Opinion

The Lost Ancestors of Ascii Art

ASCII art is as much a part of the Internet as emoticons, cats, or lol.

When Big Data Marketing Becomes Stalking
From ACM Opinion

When Big Data Marketing Becomes Stalking

Many of us now expect our online activities to be recorded and analyzed, but we assume the physical spaces we inhabit are different.

Here's Why Tech Companies' Nsa 'transparency Reports' Are Mostly a Pr Stunt
From ACM Opinion

Here's Why Tech Companies' Nsa 'transparency Reports' Are Mostly a Pr Stunt

Technology companies will soon be able to disclose more details about the number of national security orders and requests they receive, according to a joint statement...

Virtual Worlds Are Real
From ACM Opinion

Virtual Worlds Are Real

Ever since virtual worlds and online games emerged in the mainstream consciousness around 2005, the media has insisted on framing them as escapist fantasies.

Bitcoin and the Fictions of Money
From ACM Opinion

Bitcoin and the Fictions of Money

How should we think about a currency like Bitcoin?

I See You: The Databases That Facial-Recognition Apps Need to Survive
From ACM Opinion

I See You: The Databases That Facial-Recognition Apps Need to Survive

Privacy concerns have been ignited by "NameTag," a facial-recognition app designed to reveal personal information after analyzing photos taken on mobile devices...

An Open Letter from ­.s. Researchers in Cryptography and Information Security
From ACM News

An Open Letter from ­.s. Researchers in Cryptography and Information Security

Leading members of the U.S. cryptography and information-security research communities express their outrage over U.S. surveillance practices.

Ready Technology
From Communications of the ACM

Ready Technology

Fast-tracking emerging business technologies.

Digital Platforms
From Communications of the ACM

Digital Platforms: When Is Participation Valuable?

Assessing the benefits and challenges of knowledge spillovers.

Bugs and Bragging Rights
From Communications of the ACM

Bugs and Bragging Rights

It is not always size that matters.

An Integrated Approach to Safety and Security Based on Systems Theory
From Communications of the ACM

An Integrated Approach to Safety and Security Based on Systems Theory

Applying a more powerful new safety methodology to security risks.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account