acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The August Smart Lock Shows Why You Should Stick With Dumb Keys
From ACM Opinion

The August Smart Lock Shows Why You Should Stick With Dumb Keys

You almost certainly don't need a digital smart lock for your front door.

Why Germans Are Afraid of Google
From ACM Opinion

Why Germans Are Afraid of Google

These days Germany is known for being many things: a leader in clean technology, a manufacturing powerhouse, Europe's foreign policy center.

The Nsa and Me
From ACM Opinion

The Nsa and Me

The tone of the answering machine message was routine, like a reminder for a dental appointment. But there was also an undercurrent of urgency.

Every Computer System Can Be Compromised
From ACM Opinion

Every Computer System Can Be Compromised

Unfortunately, there are many risks inherent in online banking and debit cards.

We Want Privacy, but Can't Stop Sharing
From ACM Opinion

We Want Privacy, but Can't Stop Sharing

Imagine a world suddenly devoid of doors.

The Toughest Case: What If Osama Bin Laden Had an Iphone?
From ACM Opinion

The Toughest Case: What If Osama Bin Laden Had an Iphone?

In rebuking Apple and Google for their new smartphone encryption polices on Thursday, FBI Director James B. Comey became the latest law enforcement official to...

When Everything Works Like Your Cell Phone
From ACM Opinion

When Everything Works Like Your Cell Phone

Everyone understands what it means to own a plunger.

A Turing Tale
From Communications of the ACM

A Turing Tale

Assessing the accuracy of popular descriptions of Alan Turing's influences and legacy.

Disrupting and Transforming the -University
From Communications of the ACM

Disrupting and Transforming the -University

Higher education institutions must modify their business models in response to technology-driven influences.

Vendor: Vidi, Vici
From Communications of the ACM

Vendor: Vidi, Vici

Some hidden costs of outsourcing.

Outsourcing Responsibility
From Communications of the ACM

Outsourcing Responsibility

What do you do when your debugger fails you?

Risks and Myths of Cloud Computing and Cloud Storage
From Communications of the ACM

Risks and Myths of Cloud Computing and Cloud Storage

Considering existing and new types of risks inherent in cloud services.

The Bitcoin Ecosystem
From Communications of the ACM

The Bitcoin Ecosystem

Speculating on how the Bitcoin economy might evolve.

Soft Infrastructure Challenges to Scientific Knowledge Discovery
From Communications of the ACM

Soft Infrastructure Challenges to Scientific Knowledge Discovery

Seeking to overcome nontechnical challenges to the scientific enterprise.

Exploratory Engineering in Artificial Intelligence
From Communications of the ACM

Exploratory Engineering in Artificial Intelligence

Using theoretical models to plan for AI safety.

Learning For the New Digital Age
From Communications of the ACM

Learning For the New Digital Age

Digital machines are automating knowledge work at an accelerating pace. How shall we learn and stay relevant?

We Have Never Been Digital
From Communications of the ACM

We Have Never Been Digital

Reflections on the intersection of computing and the humanities.

Accountability in Future Internet Architectures
From Communications of the ACM

Accountability in Future Internet Architectures

Can technical and legal aspects be happily intertwined?

You Should Be Terrified of Superintelligent Machines
From ACM Opinion

You Should Be Terrified of Superintelligent Machines

In the recent discussion over the risks of developing superintelligent machines—that is, machines with general intelligence greater than that of humans—two narratives...

Apple's Watch Will Make People and Computers More Intimate
From ACM Opinion

Apple's Watch Will Make People and Computers More Intimate

A fundamental quest of the digital age has been to make our devices more personal.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account