acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Statistics: P Values Are Just the Tip of the Iceberg
From ACM Opinion

Statistics: P Values Are Just the Tip of the Iceberg

There is no statistic more maligned than the P value.

You Can't Backdoor a Platform
From ACM Opinion

You Can't Backdoor a Platform

According to law enforcement and intelligence agencies, encryption should come with a backdoor.

Preparing For Warfare in Cyberspace
From ACM Opinion

Preparing For Warfare in Cyberspace

The Pentagon’s new 33-page cybersecurity strategy is an important evolution in how America proposes to address a top national security threat. It is intended to...

The Future of Sex: It Gets Better
From ACM Opinion

The Future of Sex: It Gets Better

When I was 10 years old, my friend Sarah and I found a newly minted copy of "The Joy of Sex" under her parents' bed.

Building an Earth-Size Telescope, 1 Station at a Time
From ACM Opinion

Building an Earth-Size Telescope, 1 Station at a Time

Imagine a trio of aerobatic aircraft. Over the years they've gotten very good at their routine. But they want to add another five or six or seven members.

Why the Entire Premise of Tor-Enabled Routers Is Ridiculous
From ACM Opinion

Why the Entire Premise of Tor-Enabled Routers Is Ridiculous

Ars recently reviewed two "Tor routers," devices that are supposed to improve your privacy by routing all traffic through the Tor anonymity network. Although the...

The Fbi's Stance on Encrypted Communications
From ACM Opinion

The Fbi's Stance on Encrypted Communications

Imagine an America where federal, state, and municipal law enforcement agencies cannot access critical communications, even when legally authorized to do so.

Should Law Enforcement Have the Ability to Access Encrypted Communications?
From ACM Opinion

Should Law Enforcement Have the Ability to Access Encrypted Communications?

People's distress over the privacy of their communications has never been more acute. Whether the fear is over U.S. surveillance or breaches by hackers of unknown...

What Are We Doing When We Teach Computing in Schools?
From Communications of the ACM

What Are We Doing When We Teach Computing in Schools?

Research on the cognitive, educational, and policy dimensions of teaching computing is critical to achieving "computer literacy."

Honoring Technology's Power Couple: Moore's Law and the Network Effect
From ACM Opinion

Honoring Technology's Power Couple: Moore's Law and the Network Effect

Sunday marked the 50th anniversary of Moore's Law, which I believe to be one of the most important business theorems of the last century.

New Laws For New Threats Like Drones and Bioterrorism
From ACM Opinion

New Laws For New Threats Like Drones and Bioterrorism

You walk into your shower and see a spider.

As Moore's Law Turns 50, What Does the Future Hold For the Transistor?
From ACM Opinion

As Moore's Law Turns 50, What Does the Future Hold For the Transistor?

"The future of integrated electronics is the future of electronics itself."

Google's Search ­pdated Will Remake the Web in Its Own Image
From ACM News

Google's Search ­pdated Will Remake the Web in Its Own Image

Some people are calling it Mobilegeddon.

Fateful Phone Call Spawned Moore's Law
From ACM Opinion

Fateful Phone Call Spawned Moore's Law

In their new book, Moore's Law: The Life of Gordon Moore, Silicon Valley's Quiet Revolutionary, authors Arnold Thackray, David C. Brock and Rachel Jones chronicle...

Top 10 Hubble Images
From ACM Opinion

Top 10 Hubble Images

As the famous telescope turns 25, scientists who worked on the project choose their favourite pictures. 

The New Spam: Interactive Robo-Calls from the Cloud as Cheap as E-Mail
From ACM Opinion

The New Spam: Interactive Robo-Calls from the Cloud as Cheap as E-Mail

It was the middle of the day, and my cell phone rang with a local number I didn't recognize.

Case Against Google May Be ­ndercut By Rapid Shifts in Tech
From ACM Opinion

Case Against Google May Be ­ndercut By Rapid Shifts in Tech

The antitrust case against Google filed by European Union regulators on Wednesday will inevitably draw comparisons to the long-running prosecution of Microsoft,...

Snowden's 'sexy Margaret Thatcher' Password Isn't So Secure
From ACM Opinion

Snowden's 'sexy Margaret Thatcher' Password Isn't So Secure

Edward Snowden appears to have a thing for the late British conservative prime minister Margaret Thatcher. And his obsession may even be clouding his famously paranoid...

10 Images that Explain the Incredible Power of Moore's Law
From ACM Opinion

10 Images that Explain the Incredible Power of Moore's Law

Moore's Law, which states that the number of transistors per integrated circuit will double approximately every 18–24 months, has become the defining metaphor of...

Meet the Bots
From ACM Opinion

Meet the Bots

The day that science fiction writers have feared for so long has finally come—the machines have risen up.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account