acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

What Facebook Did to American Democracy
From ACM Opinion

What Facebook Did to American Democracy

In the media world, as in so many other realms, there is a sharp discontinuity in the timeline: before the 2016 election, and after.

Misinformation Is the New Normal of Mass Shootings
From ACM Opinion

Misinformation Is the New Normal of Mass Shootings

On the morning after the deadliest shooting in modern American history, there was a certain predictability in the response to a tragedy that left at least 59 dead...

Trump Is Making Canada Great Again
From ACM Opinion

Trump Is Making Canada Great Again

It's no secret that the United States has long dominated cutting-edge technologies, from personal computers and biotech to smartphones and social media.

What, Exactly, Were Russians Trying to Do With Those Facebook Ads?
From ACM Opinion

What, Exactly, Were Russians Trying to Do With Those Facebook Ads?

Many questions remain about the ads purchased by Russian-linked accounts during the 2016 presidential election.

Facebook's Belated Awakening
From ACM Opinion

Facebook's Belated Awakening

Chastened by criticism that Facebook had turned a blind eye to Russia's manipulation of the social network to interfere in the 2016 election, the company's executives...

Amazon and Whole Foods
From Communications of the ACM

Amazon and Whole Foods: Follow the Strategy (and the Money)

Checking out the recent Amazon acquisition of Whole Foods.

Fintech Platforms and Strategy
From Communications of the ACM

Fintech Platforms and Strategy

Integrating trust and automation in finance.

IoT: The Internet of Terror
From Communications of the ACM

IoT: The Internet of Terror

If it seems like the sky is falling, that's because it is.

What Can Agile Methods Bring to High-Integrity Software Development?
From Communications of the ACM

What Can Agile Methods Bring to High-Integrity Software Development?

Considering the issues and opportunities raised by Agile practices in the development of high-integrity software.

Facebook's Ad Scandal Isn't a 'fail,' It's a Feature
From ACM Opinion

Facebook's Ad Scandal Isn't a 'fail,' It's a Feature

What does it take to advertise on Facebook to people who openly call themselves "Jew haters" and want to know "how to burn Jews"? About $10 and 15 minutes, according...

I Helped Create Facebook's Ad Machine. Here's How I'd Fix It
From ACM Opinion

I Helped Create Facebook's Ad Machine. Here's How I'd Fix It

This month, two magnificently embarrassing public-relations disasters rocked the Facebook money machine like nothing else in its history.

Apple's Faceid Could Be a Powerful Tool For Mass Spying
From ACM Opinion

Apple's Faceid Could Be a Powerful Tool For Mass Spying

This Tuesday Apple unveiled a new line of phones to much fanfare, but one feature immediately fell under scrutiny:FaceID, a tool that would use facial recognition...

How to Close the Gender Gap in Tech
From ACM Opinion

How to Close the Gender Gap in Tech

Why do so few women work in tech? It isn't that they can't do math or are biologically unsuited to the tasks.

What James Damore Got Wrong About Gender Bias in Computer Science
From ACM Opinion

What James Damore Got Wrong About Gender Bias in Computer Science

In August Google employee James Damore made the news and even Wikipedia by publishing his speculation that female software engineers are underrepresented due to...

The Myth of the Skills Gap
From ACM Opinion

The Myth of the Skills Gap

The contention that America's workers lack the skills employers demand is an article of faith among analysts, politicians, and pundits of every stripe, from conservative...

Why Agile Teams Fail Without UX Research
From Communications of the ACM

Why Agile Teams Fail Without UX Research

Failures to involve end users or to collect comprehensive data representing user needs are described and solutions to avoid such failures are proposed.

When Does Law Enforcement's Demand to Read Your Data Become a Demand to Read Your Mind?
From Communications of the ACM

When Does Law Enforcement's Demand to Read Your Data Become a Demand to Read Your Mind?

On cryptographic backdoors and prosthetic intelligence.

The Enduring Legacy of Zork
From ACM Opinion

The Enduring Legacy of Zork

In 1977, four recent MIT graduates who'd met at MIT's Laboratory for Computer Science used the lab's PDP-10 mainframe to develop a computer game that captivated...

Everyone Thinks That Automation Will Take Our Jobs. The Evidence Disagrees
From ACM Opinion

Everyone Thinks That Automation Will Take Our Jobs. The Evidence Disagrees

Last year, the Japanese company SoftBank opened a cell phone store in Tokyo and staffed it entirely with sales associates named Pepper. This wasn't as hard as it...

Apple Is Pulling Vpns from the Chinese App Store. Here's What that Means. 
From ACM Opinion

Apple Is Pulling Vpns from the Chinese App Store. Here's What that Means. 

China's restrictive Internet policies are known for blocking Web users who want to reach Google, Facebook or other banned apps. But now some of those policies are...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account