acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

Bing Is Copying Your Clicks, Not Google's Results

Google's results can be accessed because Bing is snooping on IE users.

From ACM News

Was Egypt Oversold as Top Offshoring Spot?

Before Egypt turned off the Internet, the country had received increasingly high marks from leading analysis firms as a promising offshore outsourcing destination...

From ACM Opinion

Beware the Cyber War Boomerang?

Stuxnet, most sophisticated cyber weapon ever developed, could turn on vulnerable U.S. infrastructure.

The Purpose of Science Fiction
From ACM Opinion

The Purpose of Science Fiction

How it teaches governments—and citizens—how to understand the future of technology.

The Need For a New Graduation Rite of Passage
From Communications of the ACM

The Need For a New Graduation Rite of Passage

A new organization is being proposed that is solely intended to promote and recognize the ethical and moral behavior in graduates of computing-related degree programs...

25 Years of Digital Vandalism
From ACM Opinion

25 Years of Digital Vandalism

In January 1986, Basit and Amjad Alvi, sibling programmers living near the main train station in Lahore, Pakistan, wrote a piece of code to safeguard the latest...

Technology, Conferences, and Community
From Communications of the ACM

Technology, Conferences, and Community

Considering the impact and implications of changes in scholarly communication.

From Science to Engineering
From Communications of the ACM

From Science to Engineering

A series of recent reports claim the U.S. education system is in a very severe crisis; others suggest the crisis is...

Forest For the Trees
From Communications of the ACM

Forest For the Trees

With the amount of disk space available to the modern programmer, and the lack of parental supervision in most...

The Growing Harm of Not Teaching Malware
From Communications of the ACM

The Growing Harm of Not Teaching Malware

Revisiting the need to educate professionals to defend against malware in its various guises.

Household Demand For Broadband Internet Service
From Communications of the ACM

Household Demand For Broadband Internet Service

How much are consumers willing to pay for broadband service? Our research estimates consumer willingness-to-pay...

Against Cyberterrorism
From Communications of the ACM

Against Cyberterrorism

Cyberterrorism is a concept that appears recurrently in contemporary media. This coverage is particularly interesting...

Dealing With Assange and the Secrets He Spilled
From ACM News

Dealing With Assange and the Secrets He Spilled

This past June, Alan Rusbridger, the editor of The Guardian, phoned me and asked, mysteriously, whether I had any idea how to arrange a secure communication....

The Triumph of Hacker Culture
From ACM News

The Triumph of Hacker Culture

Stuxnet and the iconic, pioneering hacker Captain Crunch.

From ACM News

Social Media and Law Enforcement: Who Gets What Data and When?

This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the prying eyes ofreported...

From ACM Opinion

Apple: Disrupt or Perish

While the secret for Apple's success seems patently obvious to most&meash;as obvious as the form and function of the iPhone 4—a more subtle reason is the company's...

Why Buying Coffee with Your Iphone Matters
From ACM Opinion

Why Buying Coffee with Your Iphone Matters

Starbucks app Cash, credit, or gadget?

Gayatri Buragohain on Women and Technology in India
From ACM Opinion

Gayatri Buragohain on Women and Technology in India

Gayatri Buragohain, India’s ACM-W Ambassador, is an outspoken advocate for young women in India who are interested in technical careers but face an opportunity...

Why You Should Never, Ever Use Two Spaces After a Period
From ACM Opinion

Why You Should Never, Ever Use Two Spaces After a Period

Can I let you in on a secret? Typing two spaces after a period is totally, completely, utterly, and inarguably wrong. And yet people who use two spaces are everywhere...

From ACM Opinion

Stuxnet Authors Made Several Basic Errors

There is a growing sentiment among security researchers that the programmers behind the Stuxnet attack may not have been the super-elite cadre of developers that...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account