acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Universities and Computer Science in the European Crisis of Refugees
From Communications of the ACM

Universities and Computer Science in the European Crisis of Refugees

Considering the role of universities in promoting tolerance as well as education.

Risks of Automation
From Communications of the ACM

Risks of Automation: A Cautionary Total-System Perspective of Our Cyberfuture

Where automation is inevitable, let's do it right.

Cloud Calipers
From Communications of the ACM

Cloud Calipers

Naming the next generation and remembering that the cloud is just other people's computers.

Mobile Computing and Political Transformation
From Communications of the ACM

Mobile Computing and Political Transformation

Connecting increased mobile phone usage with political and market liberalization.

The Puzzle of Japanese Innovation and Entrepreneurship
From Communications of the ACM

The Puzzle of Japanese Innovation and Entrepreneurship

Exploring how Japan's unique mixture of social, educational, and corporate practices influence entrepreneurial activity.

Pro Evolution Soccer 2017 Review: The Finest Soccer Game Ever Made
From ACM Opinion

Pro Evolution Soccer 2017 Review: The Finest Soccer Game Ever Made

There are many ways to interpret the beautiful game.

For the Debaters: What Shall We Do About the Tech Careening Our Way?
From ACM Opinion

For the Debaters: What Shall We Do About the Tech Careening Our Way?

Here's a question I’m hoping comes up at Monday's presidential debate: Secretary Clinton and Mr. Trump, what would you do about self-driving trucks?

Are the Experts Worried About the Existential Risk of Artificial Intelligence?
From ACM Opinion

Are the Experts Worried About the Existential Risk of Artificial Intelligence?

If you believe everything you read, you are probably quite worried about the prospect of a superintelligent, killer AI.

The Cold War Is Over. The Cyber War Has Begun.
From ACM Opinion

The Cold War Is Over. The Cyber War Has Begun.

Contemplating Russian nuclear threats during the Cold War, the strategist Herman Kahn calibrated a macabre ladder of escalation, with 44 rungs ranging from "Ostensible...

Big Step For Quantum Teleportation Won't Bring ­S Any Closer to Star Trek. Here's Why
From ACM Opinion

Big Step For Quantum Teleportation Won't Bring ­S Any Closer to Star Trek. Here's Why

Two teams have set new distance records for quantum teleportation: using the weirdness of quantum mechanics to instantly transfer the condition or "state" of one...

'just Because We Can With Data, Doesn't Mean We Should'
From ACM Opinion

'just Because We Can With Data, Doesn't Mean We Should'

Data scientists should have a strong moral compass in order to handle big data, according to DJ Patil, deputy chief technology officer for data policy and chief...

The Leaky Myths of Snowden
From ACM Opinion

The Leaky Myths of Snowden

Oliver Stone's Snowden is a bad movie, stuffed with myth, short on drama.

Neither Hillary Clinton Nor Donald Trump Is Tech Savvy
From ACM Opinion

Neither Hillary Clinton Nor Donald Trump Is Tech Savvy

Rachel Law, the 20-something co-founder of a New York startup called Kip, is sitting next to me at a café, tapping her phone screen to show how the company’s service...

Why Scientists Must Share Their Research Code
From ACM Opinion

Why Scientists Must Share Their Research Code

Many scientists worry over the reproducibility of wet-lab experiments, but data scientist Victoria Stodden's focus is on how to validate computational research:...

The Feds Will Soon Be Able to Legally Hack Almost Anyone
From ACM Opinion

The Feds Will Soon Be Able to Legally Hack Almost Anyone

Digital devices and software programs are complicated. Behind the pointing and clicking on screen are thousands of processes and routines that make everything work...

The Time I Went on Border Patrol in a Virtual Reality World
From ACM Opinion

The Time I Went on Border Patrol in a Virtual Reality World

I found myself on a desolate desert road, in front of a man who was leaning against the hood of a banged-up sedan and next to a United States Border Patrol agent...

How Long ­ntil Hackers Start Faking Leaked Documents?
From ACM Opinion

How Long ­ntil Hackers Start Faking Leaked Documents?

In the past few years, the devastating effects of hackers breaking into an organization's network, stealing confidential data, and publishing everything have been...

The Worlds of H. G. Wells
From ACM Opinion

The Worlds of H. G. Wells

Herbert George Wells (1866–1946) occupies a singular place in science and culture.

Paperless Voting Could Fuel 'rigged' Election Claims
From ACM Opinion

Paperless Voting Could Fuel 'rigged' Election Claims

Voters in four competitive states will cast ballots in November on electronic machines that leave no paper trail—a lapse that threatens to sow distrust about a...

The Do-Not-Call List Has a Gaping Hole
From ACM Opinion

The Do-Not-Call List Has a Gaping Hole

Sure, legitimate telemarketers will refrain from calling you if you've put your phone number on it. But criminal telephone spammers will call you anyway because...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account