acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Apple’s Next Innovation: TV
From ACM Opinion

Apple’s Next Innovation: TV

Steve Jobs couldn't hide his frustration. Asked at a technology conference in 2010 whether Apple might finally turn its attention to television, he launched into...

Letter 'to a Future Woman in Tech' Hopes For Long Ladies' Room Lines at Conferences
From ACM Careers

Letter 'to a Future Woman in Tech' Hopes For Long Ladies' Room Lines at Conferences

Stacey Mulcahy, who is currently a lead developer at the digital creative agency Big Spaceship, has been in the tech industry since 2001.

DHS: Border Device Search Policy Does Not Violate Fourth Amendment
From ACM Opinion

DHS: Border Device Search Policy Does Not Violate Fourth Amendment

The Department of Homeland Security's Office for Civil Rights and Civil Liberties has determined that the DHS’s warrantless, and often suspicion-less, search and...

President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA On Privacy
From ACM Opinion

President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA On Privacy

With the reintroduction of the much-maligned Cyber Intelligence Sharing and Protection Act scheduled for the day after the State of the Union, the House of Representatives...

Apple and Samsung, Frenemies For Life
From ACM Opinion

Apple and Samsung, Frenemies For Life

It was the late Steve Jobs' worst nightmare. A powerful Asian manufacturer, Samsung Electronics Co Ltd, uses Google Inc's Android software to create smartphones...

The Threat of Silence
From ACM Careers

The Threat of Silence

For the past few months, some of the world's leading cryptographers have been keeping a closely guarded secret about a pioneering new invention.

Can Machines Learn Morality?
From ACM Opinion

Can Machines Learn Morality?

When John Brennan, President Obama's choice to be the next head of the CIA, appeared before a Senate committee yesterday, one question supplanted all others at...

From ACM Opinion

Texas School Board Searching For "another Side" to Theory of Evolution

We recently reviewed the documentary The Revisionaries, which chronicles the actions of the Texas state school board as it attempted to rewrite the science and...

­nseen, All-Out Cyber War on the ­.s. Has Begun
From ACM Opinion

­nseen, All-Out Cyber War on the ­.s. Has Begun

There's a war going on, and it's raging here at home—not in the streets or the fields, but on the Internet.

Phreaks and Geeks
From ACM Opinion

Phreaks and Geeks

One of the most heartfelt—and unexpected—remembrances of Aaron Swartz, who committed suicide last month at the age of 26, came from Yale professor Edward Tufte.

Geeks Are the New Guardians of Our Civil Liberties
From ACM Opinion

Geeks Are the New Guardians of Our Civil Liberties

A decade-plus of anthropological fieldwork among hackers and like-minded geeks has led me to the firm conviction that these people are building one of the most...

The Increasingly Blurry Line Between Big Data and Big Brother
From ACM Opinion

The Increasingly Blurry Line Between Big Data and Big Brother

The potential benefits of "big data" have been well described, both by us and others: the ability to spot flu trends earlier and potentially save lives, for example...

Eric Schmidt ­nloads on China in New Book
From ACM Opinion

Eric Schmidt ­nloads on China in New Book

Google executive chairman Eric Schmidt is brutally clear: China is the most dangerous superpower on Earth.

Inside the Targeted Attack on The New York Times
From ACM Opinion

Inside the Targeted Attack on The New York Times

The Chinese group behind the targeted attack on The New York Times was laser focused on accessing the email of a reporter and the newspaper’s former Beijing bureau...

A Fuzzy and Shifting Line Between Hacker and Criminal
From ACM Opinion

A Fuzzy and Shifting Line Between Hacker and Criminal

In January 2011, I was assigned to cover a hearing in Newark, where Daniel Spitler, then 26, stood accused of breaching AT&T's servers and stealing 114,000 email...

The Two Classes of Cyber Threats
From ACM Opinion

The Two Classes of Cyber Threats

There is one number that matters most in cybersecurity.

The Explosive Growth of Postdocs in Computer Science
From Communications of the ACM

The Explosive Growth of Postdocs in Computer Science

Considering the factors influencing the recent rapid increase in the number of postdoctoral positions in computer science.

Cloud Services Certification
From Communications of the ACM

Cloud Services Certification

How to address the lack of transparency, trust, and acceptance in cloud services.

The Value of Microprocessor Designs
From Communications of the ACM

The Value of Microprocessor Designs

Applying a centuries-old technique to modern cost estimation.

Reflections on Stanford's MOOCs
From Communications of the ACM

Reflections on Stanford's MOOCs

New possibilities in online education create new challenges.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account