acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

Facebook Is Using You

Last week, Facebook filed documents with the government that will allow it to sell shares of stock to the public. It is estimated to be worth at least $75 billion...

'a Clockwork Orange' Strikes 40
From ACM Opinion

'a Clockwork Orange' Strikes 40

The New York Times recently ran an opinion piece about the concept of a morality pill, a theoretical-but-apparently-not-implausible panacea for humankind's ethical...

From ACM Opinion

Welcome to the Desktop Degree

Once upon a time, a very long time ago, in 1995 to be precise, a scholar named Eli Noam published an article in the prestigious journal Science under the titleElectronics...

From ACM Opinion

Rethinking the Soul As the 'net Becomes More Lifelike

Does the Internet have a soul?

Facebook
From ACM Opinion

Facebook

Facebook is finally going public. 

From ACM Opinion

Privacy, Technology, and Law

Every day, those of us who live in the digital world give little bits of ourselves away. On Facebook and LinkedIn. To servers that store our email, Google searches...

From ACM Opinion

How to Tackle Cybersecurity

There is a right way and a wrong way to address cybersecurity.

Beyond Sopa
From ACM Opinion

Beyond Sopa

We welcomed the collapse this month of two flawed bills to prevent online piracy, bills that could have stifled speech and undermined Internet safety. But piracy...

Can Apple Become the World's First Trillion-Dollar Company?
From ACM Opinion

Can Apple Become the World's First Trillion-Dollar Company?

Almost certainly, Apple will soon hit $500bn in market capitalization—half a trillion dollars. So, based on its current growth, it's fair to wonder if it will become...

From ACM Opinion

Confessions of an Iphone Data Hog

I'm not on the run yet. But I've been warned. AT&T doesn't like what I'm doing.

How Can the U.s. Seize a 'hong Kong Site' Like Megaupload?
From ACM Opinion

How Can the U.s. Seize a 'hong Kong Site' Like Megaupload?

The Megaupload takedown, and the arrest of its key employees, might seem to vindicate late 1990s worries about the Internet and jurisdiction. Does putting a site...

From ACM Opinion

It's Time to Stop Talking About the Apple Cult

Thirty-seven million iPhones. Fifteen million iPads. Fifteen million iPods. Five million Macs. A million Apple TVs. No matter how you do the math, that's a boatload...

From ACM Opinion

Yes We Scan

Locked in our federal vaults is a tremendous storehouse of information that if digitized would form a core for our digital public libraries in America with huge...

From ACM Opinion

Time For Robots to Get Real

From robotic slug-killers to dancing humanoids, there's a lot of media buzz around robots.

How to Make Science and Tech Jobs More Enticing to Undergrads
From ACM Opinion

How to Make Science and Tech Jobs More Enticing to Undergrads

The number of U.S. undergraduate degrees being awarded in most STEM disciplines (science, technology, engineering and math) has risen steadily in recent years...

From ACM Opinion

Coding For Success

Hoxton, we have a problem. Much has been written about how we need to improve the way we educate our children about technology. This is all great, but it's not...

From ACM Opinion

Warning: This Site Contains Conspiracy Theories

In its early days, the Web was often imagined as a global clearinghouse—a new type of library, with the sum total of human knowledge always at our fingertips. 

From ACM Opinion

Why 2012, Despite Privacy Fears, Isn't Like Orwell's 1984

Last week was a remarkable one for the Web: A week that proved George Orwell's "Nineteen Eighty-Four" incredibly prescient yet woefully incorrect.

What Have We Learned About Software Engineering?
From Communications of the ACM

What Have We Learned About Software Engineering?

Upon closer examination, everything old appears to be new again in the realm of software engineering.

Emotion and Security
From Communications of the ACM

Emotion and Security

Examining the role of human emotional response in making complex security-related decisions.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account