acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

Defending a New Domain: The Pentagon

Right now, more than 100 foreign intelligence organizations are trying to hack into the digital networks that undergird U.S. military operations. The Pentagon...

Objects Never? Well, Hardly Ever!
From Communications of the ACM

Objects Never? Well, Hardly Ever!

Revisiting the Great Objects Debate.

Discussing Cyber Attack
From Communications of the ACM

Discussing Cyber Attack

Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.

Principles of the Law of Software Contracts
From Communications of the ACM

Principles of the Law of Software Contracts

An overview of a new set of legal principles for software contracts developed by the American Law Institute.

Return at Risk
From Communications of the ACM

Return at Risk

Calculating the likely true cost of projects.

From ACM Opinion

Why Intel Bought Mcafee

There's been quite a bit of head-scratching over Intel's decision to purchase McAfee, but, despite all the breathless talk about mobile security and ARM and virus...

Facebook Knows Where You Are
From ACM Opinion

Facebook Knows Where You Are

The social network's new Places feature will make it more difficult to lie to your friends.

From ACM Opinion

Beloit College Mindset List For the Class of 2014

Born when Ross Perot was warning about a giant sucking sound and Bill Clinton was apologizing for pain in his marriage, members of this fall’s entering college...

From ACM Opinion

Location Services Show the Way to the Next Great Internet Bubble

When Silicon Valley misses the mark on a new technology, the problem usually is an issue of timing. It's not what is going to happen, but when it will happen...

Data Mining Is Shaping Our World. Are We Ready For It?
From ACM Opinion

Data Mining Is Shaping Our World. Are We Ready For It?

Each day we exchange a mess of content through Facebook, Twitter, blogs, discussion boards and other online forums. How are companies and other organizations using...

From ACM Opinion

Will Someone Leak the Leaker's Secrets?

Who has the right to decide what information should be kept secret? That's the vexatious question raised by WikiLeaks and its founder Julian Assange, who masterminded...

From ACM Opinion

A Review of Verizon and Google's Net Neutrality Proposal

Efforts to protect net neutrality that involve government regulation have always faced one fundamental obstacle: the substantial danger that the regulators will...

The First Church of Robotics
From ACM Opinion

The First Church of Robotics

This constant stream of stories about artificial intelligence suggests that machines are becoming smart and autonomous, a new form of life, and that we should...

From ACM Opinion

Evil?

The alleged Google-Verizon deal that's endangering net neutrality.

Technology Lessons from the Wikileaks Saga
From ACM Opinion

Technology Lessons from the Wikileaks Saga

There's already debate about whether Wikileaks's release of 92,000 classified documents on the war in Afghanistan was more of a milestone in the annals of national...

Charging the Wikileaks Leaker with Treason Would Be Absurd
From ACM Opinion

Charging the Wikileaks Leaker with Treason Would Be Absurd

Should Pvt. Bradley Manning, the Army intelligence analyst charged with leaking troves of classified documents to WikiLeaks, be tried for treason? And what about...

I Tweet, Therefore I Am
From ACM Opinion

I Tweet, Therefore I Am

On a recent lazy Saturday morning, my daughter and I lolled on a blanket in our front yard, snacking on apricots, listening to a download of E. B. White reading...

From ACM Opinion

Protecting Privacy

On the internet, nobody knows you’re a dog but advertisers may infer that you own one. The flow of information from users of the internet both to social networks...

From ACM Opinion

The Wikileaks Paradox

Is radical transparency compatible with total anonymity?

From ACM Opinion

Cyberwar Is Hell

While we obsessed over Russian spies, top diplomats were working to stop a greater espionage problem: the threat of cyberwarfare.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account