acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Nature's Hidden Prime Number Code
From ACM Opinion

Nature's Hidden Prime Number Code

Ever since humans evolved on this planet we have been trying to make sense of the world around us. We have attempted to explain why the world looks and behaves...

From ACM News

Can We Make Machines Listen More Carefully?

You probably use voice recognition technology already, if in a limited capacity. Maybe you use Google's voice-activated search, or take advantage of its (somewhat...

'i Fear the Net Will Soon Become a War Zone'
From ACM Opinion

'i Fear the Net Will Soon Become a War Zone'

Evgeny Kaspersky is one of Russia's top Internet virus hunters. In an interview, he discusses a raft of recent hacker attacks on multinationals, the "total professionals"...

From ACM News

Decoding Your Email Personality

Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...

It's Time To Cut Back On 'hack'
From ACM Opinion

It's Time To Cut Back On 'hack'

It's time to re-examine how we use, or overuse, the words "hack" and "hacker." They're relied on far too often to describe all kinds of activities that don't...

Why Twitter Should Double Its Character Limit
From ACM Opinion

Why Twitter Should Double Its Character Limit

Five years ago this month, Twitter opened itself up to the public. The new service, initially called Twttr, was born out of software engineer Jack Dorsey's fascination...

From ACM News

Welcome to the Age of the Splinternet

Openness is the Internet's great strength—and weakness. With powerful forces carving it up, is its golden age coming to an end?

From ACM Opinion

The Internet of Things (infographic)

When we think of being connected to the Internet, our minds immediately shift to our computers, phones, and most recently tablets. This week at Cisco live, I...

From ACM Opinion

Leadership of Cyber Warriors

Leadership is a core competency of the officers, warrant officers, and non-commissioned officers across the military services. A principle tenant of leadership...

Journals For Certification, Conferences For Rapid Dissemination
From Communications of the ACM

Journals For Certification, Conferences For Rapid Dissemination

The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice...

Storage Strife
From Communications of the ACM

Storage Strife

Beware keeping data in binary format.

As Simple As Possible ? But Not More So
From Communications of the ACM

As Simple As Possible ? But Not More So

An assessment of the U.S. government's EINSTEIN project.

From Interests to Values
From Communications of the ACM

From Interests to Values

Computer science is not that difficult but wanting to learn it is.

Geography Is Alive and Well in Virtual Teams
From Communications of the ACM

Geography Is Alive and Well in Virtual Teams

Just because a team is virtual, it doesn't mean geography is dead.

Who Needs Humans?
From ACM News

Who Needs Humans?

Amid all the job losses of the Great Recession, there is one category of worker that the economic disruption has been good for: nonhumans.

The Campaign to Terrify You About Emp
From ACM Opinion

The Campaign to Terrify You About Emp

From Newt Gingrich to a Congressional "EMP Caucus," some conservatives warn the electronics-frying blast could pose gravely underestimated dangers to the U.S.

Could What Happened to Myspace Happen to Facebook?
From ACM Opinion

Could What Happened to Myspace Happen to Facebook?

MySpace fell from grace for several reasons. First, they sacrificed the service's integrity in pursuit of monetization. For those who remember, the user experience...

From ACM Opinion

How to Design a Hot Product

When Cisco killed the beloved Flip camcorder a few months ago, a lot of people were shocked and upset—including me. It just seemed like such a ham-handed, thoughtless...

From ACM News

­.s. Cyber Approach 'too Predictable' For One Top General

The nation’s second-ranking military official said Thursday that the U.S. approach to protecting its computer systems was "too predictable" and failed to penalize...

It Operations in Flux as Cloud Computing Adoption Increases, Survey Finds
From ACM Opinion

It Operations in Flux as Cloud Computing Adoption Increases, Survey Finds

A recent survey finds that with increasing reliance on cloud computing, IT executives are uncertain about the role of IT operations but also plan to invest in...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account