acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Why Haven't We Encountered Aliens Yet? The Answer Could Be Climate Change
From ACM Opinion

Why Haven't We Encountered Aliens Yet? The Answer Could Be Climate Change

Enrico Fermi, when asked about intelligent life on other planets, famously replied, "Where are they?"

What Comes After the Turing Test?
From ACM Opinion

What Comes After the Turing Test?

Over the weekend, the news broke that a "supercomputer" program called "Eugene Goostman"—an impersonation of a wisecracking, thirteen-year-old Ukranian boy—had...

That Computer Actually Got an F on the Turing Test
From ACM Opinion

That Computer Actually Got an F on the Turing Test

Over the weekend, a group of programmers claimed they built a program that passed the famous Turing Test, in which a computer tries to trick judges into believing...

Do We Really Need to Learn to Code?
From ACM Opinion

Do We Really Need to Learn to Code?

"Learn to Code!" This imperative to program seems to be everywhere these days. Bill Gates and Mark Zuckerberg recently donated ten million dollars to Code.org,...

Five Reasons Why China Is Attacking ­.s. Tech
From ACM Opinion

Five Reasons Why China Is Attacking ­.s. Tech

China's blistering attacks on U.S. tech firms is more than quid pro quo over cyberspying charges. It's a signal of China's growing confidence in its own technology...

Computer Programming Is a Dying Art
From ACM Careers

Computer Programming Is a Dying Art

Writing code is a terrible way for humans to instruct computers.

Quantum Teleportation Is Just the Latest Mind-Blowing Innovation Made Possible By Breakthroughs in Subatomic Physics
From ACM Opinion

Quantum Teleportation Is Just the Latest Mind-Blowing Innovation Made Possible By Breakthroughs in Subatomic Physics

Researchers in the Netherlands have just demonstrated that the quantum teleportation of information is now possible.

Imposing Security
From ACM Opinion

Imposing Security

Three computer bugs this year exposed passwords, e-mails, financial data, and other kinds of sensitive information connected to potentially billions of people.

Spy vs. Spy
From ACM Opinion

Spy vs. Spy

Last month, Attorney General Eric Holder announced that the United States was charging members of the Chinese military with economic espionage.

How the Nsa Could Bug Your Powered-Off Phone, and How to Stop Them
From ACM Opinion

How the Nsa Could Bug Your Powered-Off Phone, and How to Stop Them

Just because you turned off your phone doesn't mean the NSA isn't using it to spy on you.

How to Make Robots Seem Less Creepy
From ACM Opinion

How to Make Robots Seem Less Creepy

Robots may be poised to enter a new frontier in the workplace—but that doesn't mean the public is ready for it.

Four Technology Fallacies That Need to Die
From ACM Opinion

Four Technology Fallacies That Need to Die

As any historian, psychologist, sociologist, or scientist will tell you, the truth of an idea has very little to do with how fast it spreads and how well it's believed...

Why Did the Justice Department Indict Five Chinese Military Officers?
From ACM Opinion

Why Did the Justice Department Indict Five Chinese Military Officers?

At first glance, the Justice Department's 31-count indictment of five Chinese military officers for hacking into the computers of six American corporations, in...

China's Cyber-Generals Are Reinventing the Art of War
From ACM Opinion

China's Cyber-Generals Are Reinventing the Art of War

The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization...

The End Is A.i.: The Singularity Is Sci-Fi's Faith-Based Initiative
From ACM Opinion

The End Is A.i.: The Singularity Is Sci-Fi's Faith-Based Initiative

In 1993, Vernor Vinge wrote a paper about the end of the world.

From ACM Opinion

Time Machines Would Run Afoul of the Second Law of Thermodynamics

We've all seen those movies where someone goes back in time and tries to change something (the classic "Grandfather Paradox": what happens if you go back in time...

A Summer Reading List For Innovators
From ACM Opinion

A Summer Reading List For Innovators

For this summer's reading list, we bring you seven very different types of books that have been published since the start of the year, each of them exploring the...

Man Behind the First Computer Password: It's Become a Nightmare
From ACM Opinion

Man Behind the First Computer Password: It's Become a Nightmare

In the early 1960s, Fernando Corbató helped deploy the first known computer password.

Beyond Data and Analysis
From Communications of the ACM

Beyond Data and Analysis

Why business analytics and big data really matter for modern business organizations.

The Logic of Logging
From Communications of the ACM

The Logic of Logging

And the illogic of PDF.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account