acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

A New Way to Navigate the Streets of Google Maps
From ACM Opinion

A New Way to Navigate the Streets of Google Maps

Today we're introducing our most ambitious update yet: PAC-Maps.

Germanwings Flight 9525, Technology, and the Question of Trust
From ACM Opinion

Germanwings Flight 9525, Technology, and the Question of Trust

Shortly before the dreadful crash of Germanwings Flight 9525, I happened to be reading part of "The Second Machine Age," a book by two academics at M.I.T., Erik...

David and Goliath: What Do We Do About Surveillance?
From ACM Opinion

David and Goliath: What Do We Do About Surveillance?

"Dear subscriber, you have been registered as a participant in a mass disturbance."

Nsa Doesn't Need to Spy on Your Calls to Learn Your Secrets
From ACM Opinion

Nsa Doesn't Need to Spy on Your Calls to Learn Your Secrets

Governments and corporations gather, store, and analyze the tremendous amount of data we chuff out as we move through our digitized lives.

What If Web Search Results Were Based on Accuracy?
From ACM Opinion

What If Web Search Results Were Based on Accuracy?

Imagine, for a moment, that every Web search gave only accurate, verified information.

Toward More Secure Software
From Communications of the ACM

Toward More Secure Software

Two proposals intended to reduce flaws in software use two very different approaches for software security.

The Math of March Madness
From ACM Opinion

The Math of March Madness

The N.C.A.A. men's basketball tournament started Thursday, but for most Americans the real action began days before, as they pored over brackets, competing to make...

Reality Check: Comparing Hololens and Magic Leap
From ACM Opinion

Reality Check: Comparing Hololens and Magic Leap

I've seen two competing visions for a future in which virtual objects are merged seamlessly with the real world.

How Isis Succeeds on Social Media Where #stopkony Fails
From ACM Opinion

How Isis Succeeds on Social Media Where #stopkony Fails

Social networks offer an incredible tool for tapping into the collective unconscious, a virtual Jungian arena in which competition might be expected to amplify...

Don't Want Nsa to Spy on Your Email? 5 Things You Can Do
From ACM Opinion

Don't Want Nsa to Spy on Your Email? 5 Things You Can Do

More than half of Americans are worried about the U.S. government's digital spies prying into their emails, texts, search requests and other online information,...

So Sayeth Google
From ACM Opinion

So Sayeth Google

Search for "vaccines." At least within our filter bubble, the top item in Google's "In the news" section earlier this week was an anti-vax column about the "feds'...

Teaching Robots to Be Moral
From ACM Opinion

Teaching Robots to Be Moral

"Chappie," the highest-grossing movie in America last weekend, is, to put it mildly, not a great film; the critics have given it a twenty-nine on Rotten Tomatoes...

Don't Edit the Human Germ Line
From ACM Opinion

Don't Edit the Human Germ Line

It is thought that studies involving the use of genome-editing tools to modify the DNA of human embryos will be published shortly.

The Disastrous Events That Would Break the Internet
From ACM Opinion

The Disastrous Events That Would Break the Internet

The Internet is unbreakable. At least, we think it is.

If an Algorithm Wrote This, How Would You Even Know?
From ACM Opinion

If an Algorithm Wrote This, How Would You Even Know?

Let me hazard a guess that you think a real person has written what you're reading. Maybe you're right. Maybe not.

Year Zero: Our Life Timelines Begin
From ACM Opinion

Year Zero: Our Life Timelines Begin

In 10 years, every human connected to the Internet will have a timeline.

How to Restore Trust in American Technology
From ACM Opinion

How to Restore Trust in American Technology

Last November in the town of Wuzhen, China hosted its first large international summit on Internet governance and cybersecurity.

Are Your Devices Hardwired For Betrayal?
From ACM Opinion

Are Your Devices Hardwired For Betrayal?

It's an interesting time to be a computer security researcher.

The Easiest Way to Get Hacked: ­se Phone at Phone Show
From ACM Opinion

The Easiest Way to Get Hacked: ­se Phone at Phone Show


After Net Neutrality Vote, an ­ncertain Future For the Internet
From ACM Opinion

After Net Neutrality Vote, an ­ncertain Future For the Internet

Thursday, during a rancorous meeting of the Federal Communications Commission, the agencyvoted 3-2 to impose public utility regulations on Internet access providers...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account