acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

2013: Talk Gets Cheaper, Tv Gets Smarter
From ACM Opinion

2013: Talk Gets Cheaper, Tv Gets Smarter

Personal technology never stops changing.

Marking the Birth of the Modern-Day Internet
From ACM Opinion

Marking the Birth of the Modern-Day Internet

A long time ago, my colleagues and I became part of a great adventure, teamed with a small band of scientists and technologists in the U.S. and elsewhere.

How To Charge Your Laptop
From ACM Opinion

How To Charge Your Laptop

Whether they're in our computers, cell phones, or cars, the only time we think about batteries is when they're almost dead and we need to find some place to charge...

Five Developments That Could Rewire Your World
From ACM Opinion

Five Developments That Could Rewire Your World

Google is good at doing amazing.

Looking Back: The Five Most Important Security Stories of 2012
From ACM Opinion

Looking Back: The Five Most Important Security Stories of 2012

The dance among blackhat, whitehat, and grayhat hackers grew ever more intricate in 2012, thanks to a steady stream of exploits, vulnerability discoveries, and...

Ford Engineers Have 3D Printers on Their Desks. When Will You Get One?
From ACM Opinion

Ford Engineers Have 3D Printers on Their Desks. When Will You Get One?

Ford has caught the DIY revolution and now puts 3D printers at workstations for its engineers.

Social Media: Five Predictions For 2013
From ACM Opinion

Social Media: Five Predictions For 2013

When you think of social media these days, you probably think primarily of Facebook and Twitter, and perhaps Instagram. But while those services have massive—and...

Computer Code Frees ­S to Think in New Ways
From ACM Opinion

Computer Code Frees ­S to Think in New Ways

At the start of 2012, Michael Bloomberg, the mayor of New York tweeted: "My New Year's resolution is to learn to code with Codecademy."

From ACM Opinion

Sneaky Apps That Track Cellphones

A perversion of smartphone technology called "stalking apps"—precise, secretive trackings of the movements of cellphone users—is increasingly a matter of national...

Forget Yolo: Why 'big Data' Should Be the Word of the Year
From ACM Opinion

Forget Yolo: Why 'big Data' Should Be the Word of the Year

"Big Data" hasn't made any of the words-of-the-year lists I've seen so far. That's probably because it didn't get the wide public exposure given to items like "...

Who Owns the Content You ­pload Online?
From ACM Opinion

Who Owns the Content You ­pload Online?

The outrage over Instagram's announcement that it is changing its terms and conditions has turned the spotlight on the relationship between websites and users who...

Conference-Journal Hybrids
From Communications of the ACM

Conference-Journal Hybrids

Considering how to combine the best elements of conferences and journals.

What College Could Be Like
From Communications of the ACM

What College Could Be Like

Imagining an optimized education model.

Five Lessons from Really Good History
From Communications of the ACM

Five Lessons from Really Good History

Lessons learned from four award-winning books on the history of information technology.

Beyond Location
From Communications of the ACM

Beyond Location: Data Security in the 21st Century

Viewing evolving data security issues as engineering problems to be solved.

How We Build Things
From Communications of the ACM

How We Build Things: . . . and Why Things Are 90% Complete

It seems to be a law of software development that things always take longer than we expect. When a project manager talks to a designer, programmer, or tester...

The Apple-Samsung Lawsuits
From Communications of the ACM

The Apple-Samsung Lawsuits

In search of a middle ground in the intellectual property wars.

Five Big Tech Stories to Watch For in 2013
From ACM Opinion

Five Big Tech Stories to Watch For in 2013

We were dazzled by an array of smartphones. We were fascinated and then disappointed by Facebook's initial public offering. And we held our breaths as we awaited...

Building My Own Laptop
From ACM Opinion

Building My Own Laptop

We are building an open laptop, with some wacky features in it for hackers like me.

How Hackers Exploit 'the Seven Deadly Sins'
From ACM Opinion

How Hackers Exploit 'the Seven Deadly Sins'

This isn't the high tech wizardry of Hollywood but is a good, old-fashioned confidence trick.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account