acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

We Should Drop the Leap Second Before It Causes Real Damage
From ACM Opinion

We Should Drop the Leap Second Before It Causes Real Damage

The latest leap second couldn’t have come at a worse time.

How to Write About World War Iii
From ACM Opinion

How to Write About World War Iii

One of us first fought World War III from the backseat of a station wagon headed toward Myrtle Beach, South Carolina. For the other, it was at an island cabin on...

That Time the CIA Bugged a Cat to Spy on the Soviets
From ACM Opinion

That Time the CIA Bugged a Cat to Spy on the Soviets

My favorite story about American spying is one I've never been able to verify with the Central Intelligence Agency, and not for lack of trying.

Should a Driverless Car Decide Who Lives or Dies?
From ACM News

Should a Driverless Car Decide Who Lives or Dies?

The gearheads in Detroit, Tokyo, and Stuttgart have mostly figured out how to build driverless vehicles. Even the Google guys seem to have solved the riddle.

The Future of Computer Science and Engineering Is in Your Hands
From Communications of the ACM

The Future of Computer Science and Engineering Is in Your Hands

How government service can profoundly influence computer science research and education.

African Americans in the U.S. Computing Sciences Workforce
From Communications of the ACM

African Americans in the U.S. Computing Sciences Workforce

An exploration of the education-to-work pipeline.

An Updated Software Almanac
From Communications of the ACM

An Updated Software Almanac

Research into what makes software projects succeed.

Respecting People and Respecting Privacy
From Communications of the ACM

Respecting People and Respecting Privacy

Minimizing data collection to protect user privacy and increase security.

Anti-Circumvention Rules Limit Reverse Engineering
From Communications of the ACM

Anti-Circumvention Rules Limit Reverse Engineering

Considering some of the requested exceptions to technical protection mechanisms.

A Social Network For Talkers
From ACM Opinion

A Social Network For Talkers

No group needs social network software more than the elderly.

Is Facial Recognition Tech Really a Threat to Privacy?
From ACM Opinion

Is Facial Recognition Tech Really a Threat to Privacy?

Facebook has decided not to offer its photo-sharing app Moments in Europe because of regulator concerns over its facial recognition technology.

Beware the Listening Machines
From ACM Opinion

Beware the Listening Machines

One of my great pleasures in life is attending conferences on fields I'm intrigued by, but know nothing about.

How the Astros Baseball Hack Explains Chinese Cyberespionage
From ACM Opinion

How the Astros Baseball Hack Explains Chinese Cyberespionage

Two major cybersecurity scandals are currently making headlines: One is the hack of an internal network belonging to a Major League Baseball team, allegedly bya...

Why the Opm Breach Is Such a Security and Privacy Debacle
From ACM Opinion

Why the Opm Breach Is Such a Security and Privacy Debacle

If it's not already a maxim, it should be: Every big hack discovered will eventually prove to be more serious than first believed.

Facial Recognition Technology Is Everywhere. It May Not Be Legal.
From ACM News

Facial Recognition Technology Is Everywhere. It May Not Be Legal.

Being anonymous in public might be a thing of the past.

Americans Resigned to Giving ­p Their Privacy, Says Study
From ACM News

Americans Resigned to Giving ­p Their Privacy, Says Study

I am not fond of depressing you. So I'm going to leave it to a new study performed by the University of Pennsylvania's Annenberg School For Communication.

What Apple's Tim Cook Overlooked in His Defense of Privacy
From ACM Opinion

What Apple's Tim Cook Overlooked in His Defense of Privacy

Timothy D. Cook, Apple's chief executive, delivered a speech last week that raised some eyebrows in the technology industry.

It's Time to Let Edward Snowden Come Home
From ACM Opinion

It's Time to Let Edward Snowden Come Home

Now that Congress has passed, and President Obama has signed, the U.S.A. Freedom Act, which places some limits on the domestic-surveillance powers of the National...

The Real Winners in the Fight Over Government Surveillance
From ACM Opinion

The Real Winners in the Fight Over Government Surveillance

After the Senate passed legislation aimed at reforming a program that collected data about the phone calls of millions of Americans, Senate Majority Leader Mitch...

I Made an ­ntraceable 'ghost Gun' in My Office—and It Was Easy
From ACM Opinion

I Made an ­ntraceable 'ghost Gun' in My Office—and It Was Easy

This is my ghost gun. To quote the rifleman's creed, there are many like it, but this one is mine.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account