acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

An Homage to Douglas Engelbart and a Critique of the State of Tech
From ACM Opinion

An Homage to Douglas Engelbart and a Critique of the State of Tech

Theodor Holm Nelson, who coined the term hypertext, has been a thorn in the side of the computing establishment for more than a half century.

The Judge and the Nsa
From ACM Opinion

The Judge and the Nsa

Federal Judge Richard Leon has become a sudden political celebrity after his remarkable opinion holding that antiterror surveillance is unconstitutional and, even...

Internet's Sad Legacy: No More Secrets
From ACM Opinion

Internet's Sad Legacy: No More Secrets

Anyone who can watch you will watch you.

Ars Editors Remember Their First Taste of Doom, 20 Years Later
From ACM Opinion

Ars Editors Remember Their First Taste of Doom, 20 Years Later

On December 10, 1993, id Software uploaded the first publicly available version of Doom to a crowded BBS and FTP server, unleashing on the world the most influential...

Why We Can't Let American Tech Take Over the World
From ACM Opinion

Why We Can't Let American Tech Take Over the World

Whenever an app, a website, or a physical product like a gaming console is exported, it ships with a side of cultural influence.

2013: The Year 'the Stream' Crested
From ACM Opinion

2013: The Year 'the Stream' Crested

The Stream has been the organizing metaphor for the web for the past several years.

Edward Snowden, The Dark Prophet
From ACM Opinion

Edward Snowden, The Dark Prophet

To avoid surveillance, the first four Americans to visit Edward Snowden in Moscow carried no cell phones or laptops.

Falling in Love with AI Virtual Assistants: A Creepy Love Affair Nearer Than You Think
From ACM Opinion

Falling in Love with AI Virtual Assistants: A Creepy Love Affair Nearer Than You Think

"I've never loved anyone the way I've loved you," swoons Joaquin Phoenix, in the movie Her.

Diagnosis For Healthcare.gov: ­nrealistic Technology Expectations
From ACM Opinion

Diagnosis For Healthcare.gov: ­nrealistic Technology Expectations

The fiasco with the $600 million federal health insurance website wasn't all bureaucratic.

Can You Hack It?
From ACM Opinion

Can You Hack It?

Wherever you're sitting right now, take a moment to note the connected devices around you.

Answers to All the Tech Questions Your Family Will Ask You This Holiday
From ACM Opinion

Answers to All the Tech Questions Your Family Will Ask You This Holiday

Maybe it's your mom and/or dad. Maybe it's a sibling or a grandparent. Or maybe it's just that one friend who still uses a Motorola Razr from the early 2000s.

Software Is Reorganizing the World
From ACM Opinion

Software Is Reorganizing the World

For the first time in memory, adults in the United States under age forty are now expected to be poorer than their parents.

From MOOCs to SPOCs
From Communications of the ACM

From MOOCs to SPOCs

Supplementing the classroom experience with small private online courses.

Bringing Young Women Into Computing Through the NCWIT Aspirations in Computing Program
From Communications of the ACM

Bringing Young Women Into Computing Through the NCWIT Aspirations in Computing Program

A program to encourage and support girls and women in pursuing their computer science interests.

A Lesson in Resource Management
From Communications of the ACM

A Lesson in Resource Management

Waste not memory, want not memory — unless it doesn't matter.

Design Thinking
From Communications of the ACM

Design Thinking

Design thinking is the newest fashion for finding better solutions to problems. Combining it with computational thinking offers some real possibilities for improving...

Patrick Blackett
From Communications of the ACM

Patrick Blackett: Providing 'White Heat' to the British Computing Revolution

Reflections on a Nobel Prize-winning physicist's early contributions to computing.

Information Technology Impact Sourcing
From Communications of the ACM

Information Technology Impact Sourcing

New ways to contract IT work to base-of-the-pyramid suppliers.

Our Government Has Weaponized the Internet. Here's How They Did It
From ACM Opinion

Our Government Has Weaponized the Internet. Here's How They Did It

The internet backbone—the infrastructure of networks upon which internet traffic travels—went from being a passive infrastructure for communication to an active...

The Daunting Challenge of Secure Email
From ACM News

The Daunting Challenge of Secure Email

When users of Lavabit, an encrypted e-mail service, logged on to the site this past August, they found a bewildering letter on the site's main page.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account