acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Technology Helps Track a Terrorist in 'the Finish'
From ACM Opinion

Technology Helps Track a Terrorist in 'the Finish'

In late summer 2010, at the end of a morning briefing, one of President Obama's security advisers said, "Mr. President, Leon and the guys at Langley think they...

Patent Could Shackle 3D Printers with Drm
From ACM Opinion

Patent Could Shackle 3D Printers with Drm

One of the greatest benefits of 3D printing technology—the ability to make replacements or parts for household objects like toys, utensils and gadgets—may be denied...

How I Accidentally Helped Compromise the Secret Keys of High-Security Handcuffs
From ACM Opinion

How I Accidentally Helped Compromise the Secret Keys of High-Security Handcuffs

In the age of freely available modeling software, laser cutters and 3D printers, shapes that must stay secret for security's sake don't stay secret for long. Especially...

Where's the Discussion of Trojan Horses?
From ACM Opinion

Where's the Discussion of Trojan Horses?

The Mykonos Vase, discovered in 1961 in the Cyclades, is one of the earliest accounts of the Trojan Horse, used as a subterfuge by the Greeks to enter the city...

The Chinese Steve Jobs Is Probably a Pirate
From ACM Opinion

The Chinese Steve Jobs Is Probably a Pirate

When discussing innovation, the Chinese like to tout the country’s "Four Great Inventions"—paper, gunpowder, the compass, and woodblock printing—and their enormous...

A Better Approach to Huawei, Zte, and Chinese Cyberspying? Distrust and Verify
From ACM Opinion

A Better Approach to Huawei, Zte, and Chinese Cyberspying? Distrust and Verify

In the wake of the 60-page report from Congress’s Select Committee On Intelligence recommending U.S. companies stop buying Chinese-made telecommunications gear...

The Apple Maps Debate and the Real Future of Mapping
From ACM Opinion

The Apple Maps Debate and the Real Future of Mapping

The news of the last couple weeks about the stark differences between Apple and Google's mapshave shed light on how hard it is to build a mobile map.

Facebook's 1 Billion ­sers and What They Say About the Future of Computing
From ACM Opinion

Facebook's 1 Billion ­sers and What They Say About the Future of Computing

After several months as the Internet's punching bag, Facebook finally has something to brag about: 1 billion active users.

From ACM Opinion

Ietf Approves Hsts as Proposed Standard

One of the things that makes attackers dance around their basement lairs is finding unencrypted Web sessions.

The Supreme Court Needs To Weigh In on Warrantless Cell Phone Tracking By Law Enforcement
From ACM Opinion

The Supreme Court Needs To Weigh In on Warrantless Cell Phone Tracking By Law Enforcement

Americans should have no reasonable expectation of privacy over the location data stored by their mobile phone.

From ACM Opinion

Could the Internet Ever 'Wake ­Up'?

In the world of sci-fi movie geekdom, Aug. 29, 1997, was a turning point for humanity: On that day, according to the Terminator films, the network of U.S. defense...

Why Everyone (not Just Geeks) Should Care About Big Data
From ACM Opinion

Why Everyone (not Just Geeks) Should Care About Big Data

Hugo Campos has a cardiac defibrillator implanted in his body. It sends data about his heart to his doctors and back to the manufacturer, but it takes days to get...

Who's Behind the Wheel? Nobody.
From ACM Opinion

Who's Behind the Wheel? Nobody.

The Mazda Raceway at Laguna Seca is a 2.2-mile asphalt roller coaster plunging and soaring across California's tawny Monterey highlands.

From ACM Opinion

Disconnect Between Application Development and Security Getting Wider

There is a widening gulf between application developers and security decision makers inside the enterprise, and it’s starting to cost companies serious money.

From ACM Opinion

When Gps Tracking Violates Privacy Rights

For the right to personal privacy to survive in America in this digital age, courts must be meticulous in applying longstanding privacy protections to new technology...

The Tyranny of the Clock
From Communications of the ACM

The Tyranny of the Clock

Promoting a clock-free paradigm that fits everything learned about programming since Turing.

Computing as If Infrastructure Mattered
From Communications of the ACM

Computing as If Infrastructure Mattered

Understanding the technical and social fundamentals of the computing infrastructure is essential in the continuously evolving technological realm.

A Nice Piece of Code
From Communications of the ACM

A Nice Piece of Code

Colorful metaphors and properly reusing functions.

The Foresight Saga, Redux
From Communications of the ACM

The Foresight Saga, Redux

Short-term thinking is the enemy of the long-term future.

The Goldilocks Estimate
From Communications of the ACM

The Goldilocks Estimate

Balancing two extremes in project estimation.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account