acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Michigan Fight Song and Four Other Reasons to Avoid Internet Voting
From ACM Opinion

The Michigan Fight Song and Four Other Reasons to Avoid Internet Voting

In a Monday article, we described the security and reliability problems that have undermined public confidence in electronic voting machines within the United States...

Cybercrime: Mobile Changes Everything—and No One's Safe
From ACM Opinion

Cybercrime: Mobile Changes Everything—and No One's Safe

The FBI recently put out a mobile malware alert, providing us with a sobering reminder of this "evil software" for phones and tablets.

Can We Trust Voting Machines?
From ACM Opinion

Can We Trust Voting Machines?

Last week, a congressional report claimed that using Chinese telecommunications companies’ goods and services in the United States could threaten national security...

Decentralization Versus Centralization in IT Governance
From Communications of the ACM

Decentralization Versus Centralization in IT Governance

It's not as simple as you might think.

Oracle v. Google
From Communications of the ACM

Oracle v. Google: Are APIs Copyrightable?

Assessing the first phase of the trial based on claims that Google's Android platform infringes Oracle's Java-related copyrights and patents.

DARPA-Funded Radio Hackrf Aims to Be a $300 Wireless Swiss Army Knife For Hackers
From ACM Opinion

DARPA-Funded Radio Hackrf Aims to Be a $300 Wireless Swiss Army Knife For Hackers

Since the days of Alan Turing, the promise of a digital computer has been that of a universal machine, one that can be a word processor one minute and a robot brain...

Ipad Mini Launch: Why Steve Jobs Thought 7in Tablets Would Fail
From ACM Opinion

Ipad Mini Launch: Why Steve Jobs Thought 7in Tablets Would Fail

So if Apple is really launching a 7.85in "iPad mini", how does that square with what Steve Jobs said two years ago?

Capitol Hill Rhetoric Takes Aim at Wrong Cybersecurity Targets
From ACM Opinion

Capitol Hill Rhetoric Takes Aim at Wrong Cybersecurity Targets

Defense secretary Leon Panetta couldn't resist, could he? He couldn't fight the urge to dig deep into the information security cliché handbook and yank out that...

Fresh Windows, but Where’s the Start Button?
From ACM Opinion

Fresh Windows, but Where’s the Start Button?

Over the years, Keith McCarthy has become used to a certain way of doing things on his personal computers, which, like most others on the planet, have long run...

Star Trek Technology: How 21st Century Scientists Are Making It So
From ACM Opinion

Star Trek Technology: How 21st Century Scientists Are Making It So

Destination Star Trek London has kicked off at the ExCeL exhibition centre, and I'm willing to bet that among those heading down for a weekend of pointy-eared fun...

And the Firewalls Came Tumbling Down
From ACM Opinion

And the Firewalls Came Tumbling Down

There's much to like about "This Machine Kills Secrets," Andy Greenberg's well-reported history of WikiLeaks and the many projects it has inspired, but one unintentionally...

Will Neuroscience Radically Transform the Legal System?
From ACM Opinion

Will Neuroscience Radically Transform the Legal System?

Although academic fields will often enjoy more than Andy Warhol's famous 15 minutes of fame, they too are subject to today's ever-hungry machinery of hype. Like...

Technology Helps Track a Terrorist in 'the Finish'
From ACM Opinion

Technology Helps Track a Terrorist in 'the Finish'

In late summer 2010, at the end of a morning briefing, one of President Obama's security advisers said, "Mr. President, Leon and the guys at Langley think they...

Patent Could Shackle 3D Printers with Drm
From ACM Opinion

Patent Could Shackle 3D Printers with Drm

One of the greatest benefits of 3D printing technology—the ability to make replacements or parts for household objects like toys, utensils and gadgets—may be denied...

How I Accidentally Helped Compromise the Secret Keys of High-Security Handcuffs
From ACM Opinion

How I Accidentally Helped Compromise the Secret Keys of High-Security Handcuffs

In the age of freely available modeling software, laser cutters and 3D printers, shapes that must stay secret for security's sake don't stay secret for long. Especially...

Google's Little Nemo Tribute: Maybe The Best Google Doodle Ever
From ACM Opinion

Google's Little Nemo Tribute: Maybe The Best Google Doodle Ever

Winsor McCay (1869–1934) was one of the first important creators of both comic strips and animation, and a pretty fair political cartoonist to boot.

Where's the Discussion of Trojan Horses?
From ACM Opinion

Where's the Discussion of Trojan Horses?

The Mykonos Vase, discovered in 1961 in the Cyclades, is one of the earliest accounts of the Trojan Horse, used as a subterfuge by the Greeks to enter the city...

The Limits of Big Data
From ACM Opinion

The Limits of Big Data

Stop me if you've heard this one: Three statisticians go rabbit hunting.

The Chinese Steve Jobs Is Probably a Pirate
From ACM Opinion

The Chinese Steve Jobs Is Probably a Pirate

When discussing innovation, the Chinese like to tout the country’s "Four Great Inventions"—paper, gunpowder, the compass, and woodblock printing—and their enormous...

A Better Approach to Huawei, Zte, and Chinese Cyberspying? Distrust and Verify
From ACM Opinion

A Better Approach to Huawei, Zte, and Chinese Cyberspying? Distrust and Verify

In the wake of the 60-page report from Congress’s Select Committee On Intelligence recommending U.S. companies stop buying Chinese-made telecommunications gear...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account