acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Steve, Please Buy ­S a Carrier!
From ACM Opinion

Steve, Please Buy ­S a Carrier!

What should Apple do with its $76bn in cash? It could do worse than spend some of it on acquiring its own mobile carrier.

Why Cctv Has Failed to Deter Criminals
From ACM Opinion

Why Cctv Has Failed to Deter Criminals

I've lost track of the number of people who've asked me to comment on David Cameron's insane plan to cripple Britain's Internet in times of civil unrest by blocking...

From ACM Opinion

What Constitutes an Act of Cyberwar?

Before we get to that, there's a clue in the spelling of the word: cyberwar instead of cyber war. The U.S. Defense Department has determined that cyber is a fifth...

From ACM News

Shady Rat Hacking Is Not About China

Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...

From ACM News

Decoding Your Email Personality

Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...

From ACM Opinion

Leadership of Cyber Warriors

Leadership is a core competency of the officers, warrant officers, and non-commissioned officers across the military services. A principle tenant of leadership...

Journals For Certification, Conferences For Rapid Dissemination
From Communications of the ACM

Journals For Certification, Conferences For Rapid Dissemination

The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice...

Storage Strife
From Communications of the ACM

Storage Strife

Beware keeping data in binary format.

As Simple As Possible ? But Not More So
From Communications of the ACM

As Simple As Possible ? But Not More So

An assessment of the U.S. government's EINSTEIN project.

From Interests to Values
From Communications of the ACM

From Interests to Values

Computer science is not that difficult but wanting to learn it is.

Geography Is Alive and Well in Virtual Teams
From Communications of the ACM

Geography Is Alive and Well in Virtual Teams

Just because a team is virtual, it doesn't mean geography is dead.

Who Needs Humans?
From ACM News

Who Needs Humans?

Amid all the job losses of the Great Recession, there is one category of worker that the economic disruption has been good for: nonhumans.

The Campaign to Terrify You About Emp
From ACM Opinion

The Campaign to Terrify You About Emp

From Newt Gingrich to a Congressional "EMP Caucus," some conservatives warn the electronics-frying blast could pose gravely underestimated dangers to the U.S.

From ACM News

­.s. Cyber Approach 'too Predictable' For One Top General

The nation’s second-ranking military official said Thursday that the U.S. approach to protecting its computer systems was "too predictable" and failed to penalize...

From ACM News

Former CIA Director: Build a New Internet to Improve Cybersecurity

The United States may seriously want to consider creating a new Internet infrastructure to reduce the threat of cyberattacks, said Michael Hayden, President George...

From ACM Opinion

A Gold Standard in Cyber-Defense

The history of Internet security is both worrisome and instructive. When the first virus — the "Morris worm"—was launched in 1988, the Internet was a closed system...

Should the Government Need a Search Warrant to Track Your Car with Gps?
From ACM News

Should the Government Need a Search Warrant to Track Your Car with Gps?

The Supreme Court ended its term with a high-profile ruling that violent video games are protected by the First Amendment, but a bigger technology decision could...

From ACM Opinion

Apple Multitouch Patent Is All About ­x Lock-In

Apple notched a significant win last week when it was awarded a key patent related to basic multitouch functionality. The patent was first called "hugely problematic"...

From ACM News

Protect Your Computer and Phone from Illegal Police Searches

Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your...

Why Lulzsec Had No Choice but to Disband
From ACM Opinion

Why Lulzsec Had No Choice but to Disband

After just 50 days, the group said it was ceasing individual operations. Why, when you might have thought things were going so well?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account