acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

What Does It Really Matter If Companies Are Tracking US Online?
From ACM Opinion

What Does It Really Matter If Companies Are Tracking US Online?

Say you, like me, went to bed a little early last night.

The New York Times Was Losing $5 Per Second Thanks to Its Web Site Outage
From ACM News

The New York Times Was Losing $5 Per Second Thanks to Its Web Site Outage

The New York Times is still reeling from a massive Web outage that took down its homepage, its corporate Web site, and everything in between.

The Giant Hurdle For the Internet of Things
From ACM Opinion

The Giant Hurdle For the Internet of Things

Everyone's talking about the Internet of Things, a proposed network of intelligent devices that could one day automate much of the world around us. HVAC and lighting...

How Wearable Technology Could Transform Business
From ACM Opinion

How Wearable Technology Could Transform Business

Once upon a time seeing your life flash before your eyes was something people did their best to avoid. The arrival of Google Glass seems to have changed that.

WikiLeaks' Teenage Benedict Arnold
From ACM Opinion

WikiLeaks' Teenage Benedict Arnold

When he met Julian Assange for the first time, Sigurdur Thordarson admired the WikiLeaks founder's attitude and quickly signed up to the cause.

Snowden—Facts, Fictions, and  Fears
From ACM Opinion

Snowden—Facts, Fictions, and Fears

"Any analyst at any time can target anyone. Any selector, anywhere ... I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your...

The Public-Private Surveillance Partnership
From ACM Opinion

The Public-Private Surveillance Partnership

Imagine the government passed a law requiring all citizens to carry a tracking device. Such a law would immediately be found unconstitutional. Yet we all carry...

They Know Much More Than You Think
From ACM Opinion

They Know Much More Than You Think

In mid-May, Edward Snowden, an American in his late twenties, walked through the onyx entrance of the Mira Hotel on Nathan Road in Hong Kong and checked in.

A Day in the Life of My Iphone
From ACM Opinion

A Day in the Life of My Iphone

Each morning at 7 a.m., I am awakened by the sound of a spaceship next to my bed.

Mail from the (velvet) Cybercrime ­nderground
From ACM Opinion

Mail from the (velvet) Cybercrime ­nderground

Over the past six months, "fans" of this Web site and its author have shown their affection in some curious ways.

Justice For Alan Turing?
From ACM Opinion

Justice For Alan Turing?

What do we do with the knowledge that people not all that different from ourselves have behaved with astounding stupidity and cruelty, over and over again, in the...

Eff to Court: Forced Decryption ­nconstitutional
From ACM Opinion

Eff to Court: Forced Decryption ­nconstitutional

You shouldn't have to surrender your constitutional rights in order to safeguard your electronic privacy.

Could the Government Get a Search Warrant For Your Thoughts?
From ACM Opinion

Could the Government Get a Search Warrant For Your Thoughts?

We don't have a mind reading machine.

I'm Still Waiting For My Phone to Become My Wallet
From ACM Opinion

I'm Still Waiting For My Phone to Become My Wallet

During the sweltering heat wave earlier this month, it seemed too hot to wear much, carry much or do much of anything at all.

Technology to Protect Against Mass Surveillance
From ACM Opinion

Technology to Protect Against Mass Surveillance

In the past several weeks, EFF has received many requests for advice about privacy tools that provide technological shields against mass surveillance.

How Protecting Your Privacy Could Make You the Bad Guy
From ACM Opinion

How Protecting Your Privacy Could Make You the Bad Guy

There's a funny catch-22 when it comes to privacy best practices.

Money Models For MOOCs
From Communications of the ACM

Money Models For MOOCs

Considering new business models for massive open online courses.

Ultra-Low-Cost Computing and Developing Countries
From Communications of the ACM

Ultra-Low-Cost Computing and Developing Countries

Raspberry Pi and its potential in the "global South."

The Air Gap
From Communications of the ACM

The Air Gap: SCADA's Enduring Security Myth

Attempting to use isolation as a security strategy for critical systems is unrealistic in an increasingly connected world.

Cherry-Picking and the Scientific Method
From Communications of the ACM

Cherry-Picking and the Scientific Method

Software is supposed be a part of computer science, and science demands proof.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account