acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

DARPA-Funded Radio Hackrf Aims to Be a $300 Wireless Swiss Army Knife For Hackers
From ACM Opinion

DARPA-Funded Radio Hackrf Aims to Be a $300 Wireless Swiss Army Knife For Hackers

Since the days of Alan Turing, the promise of a digital computer has been that of a universal machine, one that can be a word processor one minute and a robot brain...

Capitol Hill Rhetoric Takes Aim at Wrong Cybersecurity Targets
From ACM Opinion

Capitol Hill Rhetoric Takes Aim at Wrong Cybersecurity Targets

Defense secretary Leon Panetta couldn't resist, could he? He couldn't fight the urge to dig deep into the information security cliché handbook and yank out that...

And the Firewalls Came Tumbling Down
From ACM Opinion

And the Firewalls Came Tumbling Down

There's much to like about "This Machine Kills Secrets," Andy Greenberg's well-reported history of WikiLeaks and the many projects it has inspired, but one unintentionally...

Will Neuroscience Radically Transform the Legal System?
From ACM Opinion

Will Neuroscience Radically Transform the Legal System?

Although academic fields will often enjoy more than Andy Warhol's famous 15 minutes of fame, they too are subject to today's ever-hungry machinery of hype. Like...

Technology Helps Track a Terrorist in 'the Finish'
From ACM Opinion

Technology Helps Track a Terrorist in 'the Finish'

In late summer 2010, at the end of a morning briefing, one of President Obama's security advisers said, "Mr. President, Leon and the guys at Langley think they...

Patent Could Shackle 3D Printers with Drm
From ACM Opinion

Patent Could Shackle 3D Printers with Drm

One of the greatest benefits of 3D printing technology—the ability to make replacements or parts for household objects like toys, utensils and gadgets—may be denied...

How I Accidentally Helped Compromise the Secret Keys of High-Security Handcuffs
From ACM Opinion

How I Accidentally Helped Compromise the Secret Keys of High-Security Handcuffs

In the age of freely available modeling software, laser cutters and 3D printers, shapes that must stay secret for security's sake don't stay secret for long. Especially...

Where's the Discussion of Trojan Horses?
From ACM Opinion

Where's the Discussion of Trojan Horses?

The Mykonos Vase, discovered in 1961 in the Cyclades, is one of the earliest accounts of the Trojan Horse, used as a subterfuge by the Greeks to enter the city...

The Chinese Steve Jobs Is Probably a Pirate
From ACM Opinion

The Chinese Steve Jobs Is Probably a Pirate

When discussing innovation, the Chinese like to tout the country’s "Four Great Inventions"—paper, gunpowder, the compass, and woodblock printing—and their enormous...

A Better Approach to Huawei, Zte, and Chinese Cyberspying? Distrust and Verify
From ACM Opinion

A Better Approach to Huawei, Zte, and Chinese Cyberspying? Distrust and Verify

In the wake of the 60-page report from Congress’s Select Committee On Intelligence recommending U.S. companies stop buying Chinese-made telecommunications gear...

The Apple Maps Debate and the Real Future of Mapping
From ACM Opinion

The Apple Maps Debate and the Real Future of Mapping

The news of the last couple weeks about the stark differences between Apple and Google's mapshave shed light on how hard it is to build a mobile map.

Facebook's 1 Billion ­sers and What They Say About the Future of Computing
From ACM Opinion

Facebook's 1 Billion ­sers and What They Say About the Future of Computing

After several months as the Internet's punching bag, Facebook finally has something to brag about: 1 billion active users.

From ACM Opinion

Ietf Approves Hsts as Proposed Standard

One of the things that makes attackers dance around their basement lairs is finding unencrypted Web sessions.

The Supreme Court Needs To Weigh In on Warrantless Cell Phone Tracking By Law Enforcement
From ACM Opinion

The Supreme Court Needs To Weigh In on Warrantless Cell Phone Tracking By Law Enforcement

Americans should have no reasonable expectation of privacy over the location data stored by their mobile phone.

From ACM Opinion

Could the Internet Ever 'Wake ­Up'?

In the world of sci-fi movie geekdom, Aug. 29, 1997, was a turning point for humanity: On that day, according to the Terminator films, the network of U.S. defense...

Why Everyone (not Just Geeks) Should Care About Big Data
From ACM Opinion

Why Everyone (not Just Geeks) Should Care About Big Data

Hugo Campos has a cardiac defibrillator implanted in his body. It sends data about his heart to his doctors and back to the manufacturer, but it takes days to get...

Who's Behind the Wheel? Nobody.
From ACM Opinion

Who's Behind the Wheel? Nobody.

The Mazda Raceway at Laguna Seca is a 2.2-mile asphalt roller coaster plunging and soaring across California's tawny Monterey highlands.

From ACM Opinion

Disconnect Between Application Development and Security Getting Wider

There is a widening gulf between application developers and security decision makers inside the enterprise, and it’s starting to cost companies serious money.

From ACM Opinion

When Gps Tracking Violates Privacy Rights

For the right to personal privacy to survive in America in this digital age, courts must be meticulous in applying longstanding privacy protections to new technology...

The Tyranny of the Clock
From Communications of the ACM

The Tyranny of the Clock

Promoting a clock-free paradigm that fits everything learned about programming since Turing.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account