acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

Cyberwar Is Hell

While we obsessed over Russian spies, top diplomats were working to stop a greater espionage problem: the threat of cyberwarfare.

Rights For Autonomous Artificial Agents?
From Communications of the ACM

Rights For Autonomous Artificial Agents?

The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.

Remembrances of Things Pest
From Communications of the ACM

Remembrances of Things Pest

Recalling malware milestones.

Presenting Your Project
From Communications of the ACM

Presenting Your Project

The what, the how, and the why of giving an effective presentation.

Has China Caught Up in IT?
From Communications of the ACM

Has China Caught Up in IT?

An assessment of the relative achievements in IT infrastructure, firms, and innovation in China.

Preparing Computer Science Students For the Robotics Revolution
From Communications of the ACM

Preparing Computer Science Students For the Robotics Revolution

Robotics will inspire dramatic changes in the CS curriculum.

Is the Internet a Maturing Market?
From Communications of the ACM

Is the Internet a Maturing Market?

Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband...

From ACM Opinion

Killed By Code: Software Transparency in Implantable Medical Devices

Software is an integral component of a range of devices that perform critical, lifesaving functions and basic daily tasks. As patients grow more reliant on computerized...

Five Things that Could Topple Facebook's Empire
From ACM Opinion

Five Things that Could Topple Facebook's Empire

Facebook is primed to announce this week that it's amassed a half billion active friends, a milestone reinforcing its status as the king of social networks—a company...

From ACM Opinion

Protecting the Data You Don't Even Know You Have

Let's assume for a moment that Google's collection of Wi-Fi "payload" data really was unintentional. And that Google never used the data, didn't even know it...

Search Top Secret America's Database of Private Spooks
From ACM Opinion

Search Top Secret America's Database of Private Spooks

Figuring out exactly who's cashing in on the post-9/11 boom in secret programs just got a whole lot easier.

From ACM Opinion

The Google Algorithm

Google handles nearly two-thirds of Internet search queries worldwide. Analysts reckon that most Web sites rely on the search engine for half of their traffic....

Wendy Tan-White on Skeptical Men and Twitter Success
From ACM Opinion

Wendy Tan-White on Skeptical Men and Twitter Success

Wendy Tan-White says the corporate world needs to take social media and the Internet far more seriously, but instead is allowing bureaucracy and uncertainty to...

From ACM Opinion

Cutting and Pasting: A Senior Thesis By (insert Name)

A friend who teaches at a well-known eastern university told me recently that plagiarism was turning him into a cop.

China May Displace Oak Ridge For Fastest Computer
From ACM Opinion

China May Displace Oak Ridge For Fastest Computer

China is expected to dethrone Tennessee as the home of the world's fastest computer by November, a top U.S. Energy Department official said Monday (July 12).

The Medium Is the Medium
From ACM Opinion

The Medium Is the Medium

Recently, book publishers got some good news. Researchers gave 852 disadvantaged students 12 books (of their own choosing) to take home at the end of the school...

From ACM Opinion

Five Reasons Why China Will Rule Tech

China's focus on science and technology is relentless, and is occurring at all levels of its society. Recent development points to growing concern in Washington...

Threat of 'cyberwar' Has Been Hugely Hyped
From ACM Opinion

Threat of 'cyberwar' Has Been Hugely Hyped

There's a power struggle going on in the U.S. government right now. It's about who is in charge of cyber security, and how much control the government will exert...

From ACM TechNews

Enlist It Tools

Throwing more teams of specialists at intelligence gaps that allowed terror suspects to slip through the net will not solve the problem, write Rensselaer Polytechnic...

From ACM Opinion

How E-Maps Curtail Our Freedom

Electronic maps are arguably the quintessential innovation of 20th-century cartography. Although a few academic cartographers accord the map mystical powers, it...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account