acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

A Fuzzy and Shifting Line Between Hacker and Criminal
From ACM Opinion

A Fuzzy and Shifting Line Between Hacker and Criminal

In January 2011, I was assigned to cover a hearing in Newark, where Daniel Spitler, then 26, stood accused of breaching AT&T's servers and stealing 114,000 email...

The Two Classes of Cyber Threats
From ACM Opinion

The Two Classes of Cyber Threats

There is one number that matters most in cybersecurity.

Cellphone Chips Will Remake the Server World. Period.
From ACM News

Cellphone Chips Will Remake the Server World. Period.

Facebook recently ran an experiment. Inside a test lab, somewhere behind the scenes at the world's most popular network, engineers sidled up to a computer server...

The Explosive Growth of Postdocs in Computer Science
From Communications of the ACM

The Explosive Growth of Postdocs in Computer Science

Considering the factors influencing the recent rapid increase in the number of postdoctoral positions in computer science.

Cloud Services Certification
From Communications of the ACM

Cloud Services Certification

How to address the lack of transparency, trust, and acceptance in cloud services.

The Value of Microprocessor Designs
From Communications of the ACM

The Value of Microprocessor Designs

Applying a centuries-old technique to modern cost estimation.

Reflections on Stanford's MOOCs
From Communications of the ACM

Reflections on Stanford's MOOCs

New possibilities in online education create new challenges.

Divided By Division
From Communications of the ACM

Divided By Division

Is there a "best used by" date for software?

More Sight on Foresight
From Communications of the ACM

More Sight on Foresight

My previous column, "The Foresight Saga, Redux," began a discussion that is continued here regarding some lessons learned from the 2012 U.S. November elections. In...

The Tangled Web We Have Woven
From Communications of the ACM

The Tangled Web We Have Woven

Seeking to protect the fundamental privacy of network interactions.

Becoming Biohackers: Learning the Game
From ACM Careers

Becoming Biohackers: Learning the Game

When you have lunch courtesy of the FBI, you are offered chicken Caesar salad, hamburger, or fish.

From ACM Opinion

Google's Approach to Government Requests For ­ser Data

Today, January 28, is Data Privacy Day, when the world recognizes the importance of preserving your online privacy and security.

Crapware Won't Crap Out
From ACM Opinion

Crapware Won't Crap Out

For a few years now, I've been expecting to write an obituary for crapware. Or not an obit, exactly—I was hoping to dance on its grave.

Apple Shouldn't Make Software Look Like Real Objects
From ACM Opinion

Apple Shouldn't Make Software Look Like Real Objects

Last fall Apple fired executive Scott Forstall, considered by many to be a Steve Jobs protégé.

From ACM Opinion

Remembering Aaron By Taking Care of Each Other

My friend Will Morrell, brilliant and sardonic, was the first person I ever knew to make his living close to the machine.

Jill and Scott Kelley on the Petraeus Scandal and Loss of Privacy
From ACM Opinion

Jill and Scott Kelley on the Petraeus Scandal and Loss of Privacy

We woke up on the morning of Nov. 9 expecting the usual: for one of us, the tending to patients; for the other, the morning rush of packing lunches and getting...

Hacktivism: Civil Disobedience or Cyber Crime?
From ACM Opinion

Hacktivism: Civil Disobedience or Cyber Crime?

When Reddit co-founder and internet freedom activist Aaron Swartz committed suicide, he was facing up to 13 felony counts, 50 years in prison, and millions of dollars...

The Trouble With Tinkering Time
From ACM Careers

The Trouble With Tinkering Time

It's the latest R&D trend: penciling in tinkering time on the company clock.

Samsung's Secret Weapon in the Mobile Wars: Tizen
From ACM Opinion

Samsung's Secret Weapon in the Mobile Wars: Tizen

You've probably never heard of Tizen, but the companies behind it are some of the most recognizable brands in the tech industry.

The Fbi Needs Hackers, Not Backdoors
From ACM Opinion

The Fbi Needs Hackers, Not Backdoors

Just imagine if all the applications and services you saw or heard about at CES earlier this month had to be designed to be "wiretap ready" before they could be...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account