acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

There's No Data Sheriff on the Wild Web
From ACM Opinion

There's No Data Sheriff on the Wild Web

A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...

Customers Had More Faith in Sony Than It Deserved
From ACM News

Customers Had More Faith in Sony Than It Deserved

In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services...

Your Data Isn't Secure, Don't Trust Companies to Keep It Safe
From ACM Opinion

Your Data Isn't Secure, Don't Trust Companies to Keep It Safe

It's time for a major change in the way our personal, private data is handled. We need to take back our data from companies that are unwilling and unable to protect...

From ACM Opinion

Sony Hack Highlights Importance of Breach Analysis

Sony's apparent difficulty in figuring out the extent of the damage from the recent intrusion into its PlayStation Network, while frustrating for those affected...

From ACM Opinion

Will Amazon's Recent Server Failures Slow the Rise of Cloud Computing?

Last Thursday morning around 5 a.m. eastern time, Amazon suffered a major data center outage. These sorts of outages happen now and then, but they seldom makewhy...

From ACM Opinion

Iran's Answer to Stuxnet

Might a "halal Internet" be in the wings?

Your Iphone Is Tracking You. So What.
From ACM Opinion

Your Iphone Is Tracking You. So What.

Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...

Electronic Health Records Face Human Hurdles More Than Technological Ones
From ACM News

Electronic Health Records Face Human Hurdles More Than Technological Ones

In medicine, there's the patient and there's the chart. And the chart is paper.

The Importance of Reviewing the Code
From Communications of the ACM

The Importance of Reviewing the Code

Highlighting the significance of the often overlooked underlying software used to produce research results.

Bell Labs and Centralized Innovation
From Communications of the ACM

Bell Labs and Centralized Innovation

In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...

Reaching Learners Beyond Our Hallowed Halls
From Communications of the ACM

Reaching Learners Beyond Our Hallowed Halls

Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.

Online Advertising, Behavioral Targeting, and Privacy
From Communications of the ACM

Online Advertising, Behavioral Targeting, and Privacy

Studying how privacy regulation might impact economic activity on the advertising-supported Internet.

Are You Following a Bot?
From ACM Opinion

Are You Following a Bot?

How to manipulate social movements by hacking Twitter.

The Web's Trust Issues
From ACM Opinion

The Web's Trust Issues

The most dubious phrase in English after "act natural" is "trust me." A party asking for trust without offering a reason why is probably untrustworthy. And yet...

Just How Creepy Is 'creepy'? A Test-Drive
From ACM News

Just How Creepy Is 'creepy'? A Test-Drive

You probably know that some Internet and cell phone applications like Foursquare or Twitter can broadcast your location to the world. And you might know that...

From ACM Opinion

China's War in Cyberspace, August

Strategic theorists frequently lament that military planners are very effective at preparing for the last war, not the next one. Planners today must cope with...

Asymmetries and Shortages of the Network Neutrality Principle
From Communications of the ACM

Asymmetries and Shortages of the Network Neutrality Principle

Since the beginning of the debate on network neutrality, and perhaps as an inheritance of that beginning, the controversy has been restricted...

Coder's Block
From Communications of the ACM

Coder's Block

Programming is a creative endeavor, and therefore there is such a thing as coder's block. What does it take to clear the blockage?

Platform Wars Come to Social Media
From Communications of the ACM

Platform Wars Come to Social Media

The world can absorb more social media sites, but how many?

Building Castles in the Air
From Communications of the ACM

Building Castles in the Air

Reflections on recruiting and training programmers during the early period of computing.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account