acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Case For Kill Switches in Military Weaponry
From ACM Opinion

The Case For Kill Switches in Military Weaponry

This summer the insurgent group ISIS captured the Iraqi city of Mosul—and along with it, three army divisions' worth of U.S.-supplied equipment from the Iraqi army...

Why Internet Governance Should Be Left to the Engineers
From ACM Opinion

Why Internet Governance Should Be Left to the Engineers

As the Internet and the disruptive innovations it spawns are becoming economically, politically, and culturally vital for the world’s three billion users (and counting)...

How to Keep Photos of Your Naked Body Off the Internet
From ACM Opinion

How to Keep Photos of Your Naked Body Off the Internet

If you've been conscious at any point during the past 48 hours, you've probably heard about the slew of raunchy celeb selfies making their way around the internet...

John Walker, the Navy Spy Who Defined Crypto-Betrayal, Dead at 77
From ACM Opinion

John Walker, the Navy Spy Who Defined Crypto-Betrayal, Dead at 77

This week, the man responsible for what is probably the biggest cryptographic failure in military history died—just a few months before he was due to be released...

Why Big Data Has Some Big Problems When It Comes to Public Policy
From ACM Opinion

Why Big Data Has Some Big Problems When It Comes to Public Policy

For all the talk about using big data and data science to solve the world’s problems—and even all the talk about big data as one of the world’s problems—it seems...

The New Editors of the Internet
From ACM Opinion

The New Editors of the Internet

Bowing to their better civic natures, and the pleas of James Foley's family, Twitter and YouTube have pulled down videos and photos of his murder.

How to Save the Net: Keep It Open
From ACM Opinion

How to Save the Net: Keep It Open

For all of its history, the Internet has enjoyed the fruits of an openness principle: the idea that anyone can reach any site online and that information and data...

Anatomy of an Air Strike: Three Intelligence Streams Working in Concert
From ACM Opinion

Anatomy of an Air Strike: Three Intelligence Streams Working in Concert

In a fast-moving war with an elusive foe like the Islamic State militants, information is as important as guns, jet fighters and bombs.

Police Cameras Can Shed Light, but Raise Privacy Concerns
From ACM Opinion

Police Cameras Can Shed Light, but Raise Privacy Concerns

Michael Brown, the unarmed teenager who was shot during an encounter with police in Ferguson, Mo., on Aug. 9, was recorded by a convenience store surveillance camera...

Email Is Still the Best Thing on the Internet
From ACM Opinion

Email Is Still the Best Thing on the Internet

All these people are trying to kill email.

Why the Public Library Beats Amazon—for Now
From ACM Opinion

Why the Public Library Beats Amazon—for Now

A growing stack of companies would like you to pay a monthly fee to read e-books, just like you subscribe to Netflix to binge on movies and TV shows.

How Wwi Codebreakers Taught Your Gas Meter to Snitch on You
From ACM Opinion

How Wwi Codebreakers Taught Your Gas Meter to Snitch on You

In the depths of night on August 5th 1914 the British Cable Ship Alert took the first significant action of World War I, severing the five German submarine cables...

Security Secrets, Dated but Real
From ACM Opinion

Security Secrets, Dated but Real

Was the National Cryptologic Museum designed using a code of some kind?

The Weird Reasons Why People Make ­p False Identities on the Internet
From ACM Opinion

The Weird Reasons Why People Make ­p False Identities on the Internet

Sockpuppetry—using false identities for deception—is centuries old, but the advent of the web has made creating sockpuppets, and falling for their tricks, easier...

How to Invent a Person Online
From ACM Opinion

How to Invent a Person Online

On April 8, 2013, I received an envelope in the mail from a nonexistent return address in Toledo, Ohio.

How the ­.s. Stumbled Into the Drone Era
From ACM Opinion

How the ­.s. Stumbled Into the Drone Era

On Sept. 7, 2000, in the waning days of the Clinton administration, a U.S. Predator drone flew over Afghanistan for the first time.

How to Talk About Blowing Things ­p in Cyberspace, According to the Military
From ACM Opinion

How to Talk About Blowing Things ­p in Cyberspace, According to the Military

Bombs are relatively simple, when you boil everything down.

Researching the Robot Revolution
From Communications of the ACM

Researching the Robot Revolution

Considering a program for cross-disciplinary research between computer scientists and economists studying the effects of computers on work.

From Communications of the ACM

Forked Over

Shortchanged by open source.

Private Then Shared?
From Communications of the ACM

Private Then Shared?

Designing for the mobile phone to shared PC pipeline.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account