acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Eff at 25: Remembering the Case that Established Code as Speech
From ACM Opinion

Eff at 25: Remembering the Case that Established Code as Speech

One of EFF's first major legal victories was Bernstein v. Department of Justice, a landmark case that resulted in establishing code as speech and changed United...

Facebook Is Eating the Internet
From ACM Careers

Facebook Is Eating the Internet

Facebook, it seems, is unstoppable. The social publishing site, just 11 years old, is now the dominant force in American media.

Statistics: P Values Are Just the Tip of the Iceberg
From ACM Opinion

Statistics: P Values Are Just the Tip of the Iceberg

There is no statistic more maligned than the P value.

You Can't Backdoor a Platform
From ACM Opinion

You Can't Backdoor a Platform

According to law enforcement and intelligence agencies, encryption should come with a backdoor.

Preparing For Warfare in Cyberspace
From ACM Opinion

Preparing For Warfare in Cyberspace

The Pentagon’s new 33-page cybersecurity strategy is an important evolution in how America proposes to address a top national security threat. It is intended to...

The Future of Sex: It Gets Better
From ACM Opinion

The Future of Sex: It Gets Better

When I was 10 years old, my friend Sarah and I found a newly minted copy of "The Joy of Sex" under her parents' bed.

Building an Earth-Size Telescope, 1 Station at a Time
From ACM Opinion

Building an Earth-Size Telescope, 1 Station at a Time

Imagine a trio of aerobatic aircraft. Over the years they've gotten very good at their routine. But they want to add another five or six or seven members.

Why the Entire Premise of Tor-Enabled Routers Is Ridiculous
From ACM Opinion

Why the Entire Premise of Tor-Enabled Routers Is Ridiculous

Ars recently reviewed two "Tor routers," devices that are supposed to improve your privacy by routing all traffic through the Tor anonymity network. Although the...

The Fbi's Stance on Encrypted Communications
From ACM Opinion

The Fbi's Stance on Encrypted Communications

Imagine an America where federal, state, and municipal law enforcement agencies cannot access critical communications, even when legally authorized to do so.

Should Law Enforcement Have the Ability to Access Encrypted Communications?
From ACM Opinion

Should Law Enforcement Have the Ability to Access Encrypted Communications?

People's distress over the privacy of their communications has never been more acute. Whether the fear is over U.S. surveillance or breaches by hackers of unknown...

What Are We Doing When We Teach Computing in Schools?
From Communications of the ACM

What Are We Doing When We Teach Computing in Schools?

Research on the cognitive, educational, and policy dimensions of teaching computing is critical to achieving "computer literacy."

Honoring Technology's Power Couple: Moore's Law and the Network Effect
From ACM Opinion

Honoring Technology's Power Couple: Moore's Law and the Network Effect

Sunday marked the 50th anniversary of Moore's Law, which I believe to be one of the most important business theorems of the last century.

New Laws For New Threats Like Drones and Bioterrorism
From ACM Opinion

New Laws For New Threats Like Drones and Bioterrorism

You walk into your shower and see a spider.

As Moore's Law Turns 50, What Does the Future Hold For the Transistor?
From ACM Opinion

As Moore's Law Turns 50, What Does the Future Hold For the Transistor?

"The future of integrated electronics is the future of electronics itself."

Google's Search ­pdated Will Remake the Web in Its Own Image
From ACM News

Google's Search ­pdated Will Remake the Web in Its Own Image

Some people are calling it Mobilegeddon.

Fateful Phone Call Spawned Moore's Law
From ACM Opinion

Fateful Phone Call Spawned Moore's Law

In their new book, Moore's Law: The Life of Gordon Moore, Silicon Valley's Quiet Revolutionary, authors Arnold Thackray, David C. Brock and Rachel Jones chronicle...

Top 10 Hubble Images
From ACM Opinion

Top 10 Hubble Images

As the famous telescope turns 25, scientists who worked on the project choose their favourite pictures. 

The New Spam: Interactive Robo-Calls from the Cloud as Cheap as E-Mail
From ACM Opinion

The New Spam: Interactive Robo-Calls from the Cloud as Cheap as E-Mail

It was the middle of the day, and my cell phone rang with a local number I didn't recognize.

Case Against Google May Be ­ndercut By Rapid Shifts in Tech
From ACM Opinion

Case Against Google May Be ­ndercut By Rapid Shifts in Tech

The antitrust case against Google filed by European Union regulators on Wednesday will inevitably draw comparisons to the long-running prosecution of Microsoft,...

Snowden's 'sexy Margaret Thatcher' Password Isn't So Secure
From ACM Opinion

Snowden's 'sexy Margaret Thatcher' Password Isn't So Secure

Edward Snowden appears to have a thing for the late British conservative prime minister Margaret Thatcher. And his obsession may even be clouding his famously paranoid...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account