acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Behold! Jonathan Ive's Apple
From ACM Opinion

Behold! Jonathan Ive's Apple

Apple is today releasing the much-anticipated iOS 7, and with it, the biggest overhaul of its mobile operating system since it debuted in 2007 with the original...

The 'legalization' of China’s Internet Crackdown
From ACM Opinion

The 'legalization' of China’s Internet Crackdown

Internet usage—especially microblogging on Sina Weibo, China’s largest Twitter-like social media site—is presenting new challenges and new attempts to meet them...

Forget Moocs
From ACM Opinion

Forget Moocs

For a year or two there, free online classes seemed like they just might be the future of higher education.

Cryptographers Have an Ethics Problem
From ACM Opinion

Cryptographers Have an Ethics Problem

Last week, I visited the MIT computer science department looking for a very famous cryptographer.

Should Students ­se a Laptop in Class?
From ACM Opinion

Should Students ­se a Laptop in Class?

There's a widely shared image on the Internet of a teacher's note that says: "Dear students, I know when you're texting in class. Seriously, no one just looks down...

Why a Cyberwar Won't Happen
From ACM Opinion

Why a Cyberwar Won't Happen

Exactly two decades ago, the RAND Corporation, an influential think tank, proclaimed that "cyberwar is coming!"

Nsa Surveillance Makes For Strange Bedfellows
From ACM Opinion

Nsa Surveillance Makes For Strange Bedfellows

The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...

If the New Iphone Has Fingerprint Authentication, Can It Be Hacked?
From ACM Opinion

If the New Iphone Has Fingerprint Authentication, Can It Be Hacked?

When Apple bought AuthenTec for its biometrics technology—reported as one of its most expensive purchases—there was a lot of speculation about how the company would...

Nsa's Anti-Encryption Efforts Compromise ­.s. Security
From ACM Opinion

Nsa's Anti-Encryption Efforts Compromise ­.s. Security

National Security Agency efforts to overcome encryption of online data weaken American security and undermine the government's duty to protect its own cyberinfrastructure...

From ACM Opinion

Online Data Brokers Know You—surprisingly Well

I'm a middle-aged guy who lives in a house that was built more than 50 years ago.

From ACM Opinion

Online Data Brokers Know You—Surprisingly Well

I'm a middle-aged guy who lives in a house that was built more than 50 years ago.

Nsa Surveillance: A Guide to Staying Secure
From ACM Opinion

Nsa Surveillance: A Guide to Staying Secure

Now that we have enough details about how the NSA eavesdrops on the Internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems...

Why the ­.s. Should ­se Cyber Weapons Against Syria
From ACM Opinion

Why the ­.s. Should ­se Cyber Weapons Against Syria

If the Obama administration does conduct military strikes against Syria, as seems likely, it should use military cyber weapons at the earliest possible moment to...

How Advanced Is the NSA's Cryptanalysis—And Can We Resist It?
From ACM Opinion

How Advanced Is the NSA's Cryptanalysis—And Can We Resist It?

The latest Snowden document is the U.S. intelligence "black budget."

Who Will Prosper in the New World
From ACM Opinion

Who Will Prosper in the New World

Self-driving vehicles threaten to send truck drivers to the unemployment office.

The Nsa's Crypto "breakthrough"
From ACM Opinion

The Nsa's Crypto "breakthrough"

One difficulty of reporting on spy outfits like America's National Security Agency is the veil of secrecy they operate behind.

It's a Myth That Entrepreneurs Drive New Technology
From ACM Opinion

It's a Myth That Entrepreneurs Drive New Technology

Images of tech entrepreneurs such as Mark Zuckerberg and Steve Jobs are continually thrown at us by politicians, economists, and the media.

From ACM Opinion

Choosing Real-World Impact Over Impact Factor

My annual report for the 2012-13 academic year stares at me from an undisturbed corner of my desk.

Madden Turns 25: How the Video Game Sacked Its Rivals
From ACM Opinion

Madden Turns 25: How the Video Game Sacked Its Rivals

The year was 1988. George Michael's "Faith" was top of the pops. "Roseanne" was the number-one show on TV. Bruce Willis, starring in "Die Hard," still had hair.

The Real, Terrifying Reason Why British Authorities Detained David Miranda
From ACM Opinion

The Real, Terrifying Reason Why British Authorities Detained David Miranda

Last Sunday, David Miranda was detained while changing planes at London Heathrow Airport by British authorities for nine hours under a controversial British law—the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account