acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Frightening Things You Hear at a Black Hat Conference
From ACM Opinion

The Frightening Things You Hear at a Black Hat Conference

Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.

From ACM Opinion

The Public Is Left in the Dark When Courts Allow Electronic Surveillance

A big part of Magistrate Judge Stephen W. Smith's job in Federal District Court in Houston is to consider law enforcement requests for cellphone and email records...

The Ethics of Software Engineering Should Be an Ethics For the Client
From Communications of the ACM

The Ethics of Software Engineering Should Be an Ethics For the Client

Viewing software engineering as a communicative art in which client engagement is essential.

Internet Elections
From Communications of the ACM

Internet Elections: Unsafe in Any Home?

Experiences with electronic voting suggest elections should not be conducted via the Internet.

The Internet Is Everywhere, but the Payoff Is Not
From Communications of the ACM

The Internet Is Everywhere, but the Payoff Is Not

Examining the uneven patterns of Internet economics.

The Politics of 'Real Names'
From Communications of the ACM

The Politics of 'Real Names'

Power, context, and control in networked publics.

Will Massive Open Online Courses Change How We Teach?
From Communications of the ACM

Will Massive Open Online Courses Change How We Teach?

Sharing recent experiences with the massive open artificial intelligence course developed and conducted by Stanford faculty Sebastian Thrun and Peter Norvig.  

Inside the Hermit Kingdom
From Communications of the ACM

Inside the Hermit Kingdom: IT and Outsourcing in North Korea

North Korea has a sizeable IT sector. Some 10,000 professionals work in the field, and many more have IT degrees. They are already engaged in outsourcing contracts...

What's ­p With Skype?
From ACM Opinion

What's ­p With Skype?

Is the government listening to our Skype conversations? If so, it's not a bad thing. Here's why.

Can Data Mining Stop the Killing?
From ACM Opinion

Can Data Mining Stop the Killing?

Would Total Information Awareness have stopped James Eagan Holmes?

So, Who Really Did Invent the Internet?
From ACM Opinion

So, Who Really Did Invent the Internet?

Gordon Crovitz of the Wall Street Journal's editorial page reopens the ancient debate over who invented the Internet with a column Monday calling out the notion...

From ACM Opinion

Wsj Mangles History to Argue Government Didn't Launch the Internet

"It's an urban legend that the government launched the Internet," writes L. Gordon Crovitz in Monday's Wall Street Journal, launching into just one of a myriad...

Who Really Invented the Internet?
From ACM Opinion

Who Really Invented the Internet?

A telling moment in the presidential race came recently when Barack Obama said: "If you've got a business, you didn't build that. Somebody else made that happen...

Taking the Cyberattack Threat Seriously
From ACM Opinion

Taking the Cyberattack Threat Seriously

Last month I convened an emergency meeting of my cabinet and top homeland security, intelligence and defense officials. Across the country trains had derailed,...

Stuxnet Shifts the Cyber Arms Race ­p a Gear
From ACM Opinion

Stuxnet Shifts the Cyber Arms Race ­p a Gear

Over the last 25 years we've seen a massive change in how we think about information.

Marissa Mayer Is in Over Her Head
From ACM Opinion

Marissa Mayer Is in Over Her Head

One evening in the spring of 1999, Marissa Mayer got a recruiting email from a tiny search company. "I was in a long-distance relationship at the time, so I was...

From ACM Opinion

Technology Can Be Harnessed to Fight Drug Cartels in Mexico

A couple of months ago we visited Juarez, Mexico, a city right across our border—yet so far away.

Western Media Seeking to Play Down Iran's Cyber Capability By New Virus Story
From ACM Opinion

Western Media Seeking to Play Down Iran's Cyber Capability By New Virus Story

The western media sought to play down Iran's cyber and computer software capability by releasing hundreds of reports on the discovery of a new computer virus and...

From ACM Opinion

The End of Privacy?

Cellphones, email, and online social networking have come to rule daily life, but Congress has done nothing to update federal privacy laws to better protect digital...

Why There Are Too Many Patents in America
From ACM Opinion

Why There Are Too Many Patents in America

Recently, while sitting as a trial judge, I dismissed a case in which Apple and Motorola had sued each other for alleged infringement of patents for components...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account