acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From Computational Thinking to Computational Participation in K-12 Education
From Communications of the ACM

From Computational Thinking to Computational Participation in K-12 Education

Seeking to reframe computational thinking as computational participation.

Computer Security Is Broken
From Communications of the ACM

Computer Security Is Broken: Can Better Hardware Help Fix It?

Computer security problems have far exceeded the limits of the human brain. What can we do about it?

Stuxnet the Movie: The ­.s. Has Pwned Iran
From ACM Opinion

Stuxnet the Movie: The ­.s. Has Pwned Iran

The new documentary about Stuxnet, 'Zero Days,' says the U.S. had a far larger cyber operation against Iran called Nitro Zeus that has compromised the country's...

Why a Killer Robot Was Likely the Only Option For Dallas Police
From ACM Opinion

Why a Killer Robot Was Likely the Only Option For Dallas Police

When a police robot killed suspect Micah Johnson in Dallas early Friday morning, it was likely an unprecedented event.

If To Err Is Human, Should Technology Help ­s Shed Some Humanity?
From ACM Opinion

If To Err Is Human, Should Technology Help ­s Shed Some Humanity?

By all accounts, technology has made us safer.

How to Stop Robocalls … or at Least Fight Back
From ACM Opinion

How to Stop Robocalls … or at Least Fight Back

"This is a final notice from the IRS."

How Risky Are the World Economic Forum's Top 10 Emerging Technologies For 2016?
From ACM Opinion

How Risky Are the World Economic Forum's Top 10 Emerging Technologies For 2016?

Take an advanced technology. Add a twist of fantasy. Stir well, and watch the action unfold.

Inverse Privacy
From Communications of the ACM

Inverse Privacy

Seeking a market-based solution to the problem of a person's unjustified inaccessibility to their private information.

Big Data Analytics and Revision of the Common Rule
From Communications of the ACM

Big Data Analytics and Revision of the Common Rule

Reconsidering traditional research ethics given the emergence of big data analytics.

How Charles Bachman Invented the DBMS, a Foundation of Our Digital World
From Communications of the ACM

How Charles Bachman Invented the DBMS, a Foundation of Our Digital World

His 1963 Integrated Data Store set the template for all subsequent database management systems.

<i>Apple v. Samsung</i> and the Upcoming Design Patent Wars?
From Communications of the ACM

Apple v. Samsung and the Upcoming Design Patent Wars?

Assessing an important recent design patent infringement court decision.

Here's Your Chance to Decode President Lincoln's Secret Messages
From ACM Opinion

Here's Your Chance to Decode President Lincoln's Secret Messages

On April 12, 1865—three days after Gen. Robert E. Lee surrendered at Appomattox and two days before President Abraham Lincoln was assassinated—the president sent...

Orlando Shows the Limits of Facebook's Terror Policing
From ACM Opinion

Orlando Shows the Limits of Facebook's Terror Policing

Both leading up to and during his deadly assault on Orlando night club Pulse, Omar Mateen accessed his Facebook account.

What Happens If Gps Fails?
From ACM Opinion

What Happens If Gps Fails?

In only took thirteen millionths of a second to cause a whole lot of problems.

Wikipedia Warns Against French Attempt to Extend Eu Privacy Law Globally
From ACM Opinion

Wikipedia Warns Against French Attempt to Extend Eu Privacy Law Globally

Wikipedia co-founder Jimmy Wales has said an attempt by France to give an online privacy ruling global force is opening up a "disastrous can of worms" and could...

Will the Constitution Protect Your Next Smartphone?
From ACM Opinion

Will the Constitution Protect Your Next Smartphone?

More than a decade ago, the keynote speaker at a major annual cybersecurity conference strode into the spotlight and predicted the death of the password.

Dear Apple: Please ­se These Ideas to Modernize the Mac
From ACM Opinion

Dear Apple: Please ­se These Ideas to Modernize the Mac

I took a vacation last month. I traveled some. I read a lot. And I refurbished an old late 2008 MacBook Pro, one of the original aluminum unibody models.

The Snowden Effect: Privacy Is Good For Business
From ACM Opinion

The Snowden Effect: Privacy Is Good For Business

On June 6, 2013, Edward Snowden—holed up in a Hong Kong hotel room with two Guardian reporters and a filmmaker—told the world about a secret surveillance program...

The Real Reason America Controls Its Nukes with Ancient Floppy Disks
From ACM Opinion

The Real Reason America Controls Its Nukes with Ancient Floppy Disks

America's nuclear arsenal depends on a surprising relic of the 1970s that few of us may recall: the humble floppy disk.

The Woeful Tsa Doesn't Need More Staff. It Needs This Tech
From ACM Opinion

The Woeful Tsa Doesn't Need More Staff. It Needs This Tech

American airport security has never been something to look forward to, but in the past few weeks, it's attained new levels of misery.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account