acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

How to Make Robots Seem Less Creepy
From ACM Opinion

How to Make Robots Seem Less Creepy

Robots may be poised to enter a new frontier in the workplace—but that doesn't mean the public is ready for it.

Four Technology Fallacies That Need to Die
From ACM Opinion

Four Technology Fallacies That Need to Die

As any historian, psychologist, sociologist, or scientist will tell you, the truth of an idea has very little to do with how fast it spreads and how well it's believed...

Why Did the Justice Department Indict Five Chinese Military Officers?
From ACM Opinion

Why Did the Justice Department Indict Five Chinese Military Officers?

At first glance, the Justice Department's 31-count indictment of five Chinese military officers for hacking into the computers of six American corporations, in...

China's Cyber-Generals Are Reinventing the Art of War
From ACM Opinion

China's Cyber-Generals Are Reinventing the Art of War

The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization...

The End Is A.i.: The Singularity Is Sci-Fi's Faith-Based Initiative
From ACM Opinion

The End Is A.i.: The Singularity Is Sci-Fi's Faith-Based Initiative

In 1993, Vernor Vinge wrote a paper about the end of the world.

From ACM Opinion

Time Machines Would Run Afoul of the Second Law of Thermodynamics

We've all seen those movies where someone goes back in time and tries to change something (the classic "Grandfather Paradox": what happens if you go back in time...

Man Behind the First Computer Password: It's Become a Nightmare
From ACM Opinion

Man Behind the First Computer Password: It's Become a Nightmare

In the early 1960s, Fernando Corbató helped deploy the first known computer password.

Beyond Data and Analysis
From Communications of the ACM

Beyond Data and Analysis

Why business analytics and big data really matter for modern business organizations.

The Logic of Logging
From Communications of the ACM

The Logic of Logging

And the illogic of PDF.

Owning and Using
From Communications of the ACM

Owning and Using

On vital and supporting systems.

Secrets, Lies and Snowden's Email: Why I Was Forced to Shut Down Lavabit
From ACM Opinion

Secrets, Lies and Snowden's Email: Why I Was Forced to Shut Down Lavabit

My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation...

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?
From ACM Opinion

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?

There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose...

The Internet's History Isn’t As "open" As You Think
From ACM Opinion

The Internet's History Isn’t As "open" As You Think

This spring, the Federal Communications Commission is deciding how to regulate the "Open Internet"—a term it uses to refer to the movement for net neutrality.

Every Little Byte Counts
From ACM Opinion

Every Little Byte Counts

In "On What We Can Not Do," a short and pungent essay published a few years ago, the Italian philosopher Giorgio Agamben outlined two ways in which power operates...

How a Raccoon Became an Aardvark
From ACM Opinion

How a Raccoon Became an Aardvark

In July of 2008, Dylan Breves, then a seventeen-year-old student from New York City, made a mundane edit to a Wikipedia entry on the coati.

How Google Built Its 3-D Interactive Rubik's Cube Doodle
From ACM News

How Google Built Its 3-D Interactive Rubik's Cube Doodle

Today Google launched one of its coolest doodles yet: a 3-D interactive Rubik's Cube.

Ungoogle Me: The Case For Scrubbing Search Results
From ACM Opinion

Ungoogle Me: The Case For Scrubbing Search Results

The Internet has much to say about the recent ruling by the Court of Justice of the European Union, which determines that if a person wants some personal information...

Forget 'the Cloud'; 'the Fog' Is Tech's Future
From ACM Opinion

Forget 'the Cloud'; 'the Fog' Is Tech's Future

I'm as big a believer in the transformational power of cloud computing as anyone you'll meet.

Who Watches the Watchers? Big Data Goes ­nchecked
From ACM Opinion

Who Watches the Watchers? Big Data Goes ­nchecked

The National Security Agency might be tracking your phone calls. But private industry is prying far more deeply into your life.

Do We Need Asimov's Laws?
From ACM News

Do We Need Asimov's Laws?

In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account