acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Google's Hybrid Approach to Research
From Communications of the ACM

Google's Hybrid Approach to Research

By closely connecting research and development Google is able to conduct experiments on an unprecedented scale, often resulting in new capabilities for the company...

Alan Turing's Other Universal Machine
From Communications of the ACM

Alan Turing's Other Universal Machine

All computer scientists know about the Universal Turing Machine, one of the foundation stones of theoretical computer science. Much less well known is the practical...

An Information Strategy For Environmental Sustainability
From Communications of the ACM

An Information Strategy For Environmental Sustainability

Many proposed solutions to the species-threatening transformations born of human industrialization have an engineering orientation. Often the suggested remedies...

Can Online Piracy Be Stopped By Laws?
From Communications of the ACM

Can Online Piracy Be Stopped By Laws?

Considering the legal responsibilities of Internet intermediaries in the aftermath of the Stop Online Privacy Act controversy.

Business Models For Strategy and Innovation
From Communications of the ACM

Business Models For Strategy and Innovation

While often ambiguously defined, business models are central to innovation.

Why Microsoft's Surface Tablet Shames the Pc Industry
From ACM Opinion

Why Microsoft's Surface Tablet Shames the Pc Industry

On June 18, Microsoft beckoned 200 or so members of the media to a grimy, industrial part of Hollywood for what it described as a can’t-miss affair.

The Highly Productive Habits of Alan Turing
From ACM News

The Highly Productive Habits of Alan Turing

June 23 marks the 100th birthday of Alan Turing. If I had to name five people whose personal efforts led to the defeat of Nazi Germany, the English mathematician...

How Flame Virus Has Changed Everything For Online Security Firms
From ACM Opinion

How Flame Virus Has Changed Everything For Online Security Firms

Here's a question: if you connect an unprotected Windows computer to the Internet, how long will it take before it is infected by malicious software?

Alan Turing: Why the Tech World's Hero Should Be a Household Name
From ACM Opinion

Alan Turing: Why the Tech World's Hero Should Be a Household Name

I've worked in computing, and more specifically computer networking, nearly all my life. It's an industry in a constant state of innovation, always pushing beyond...

What Have We Learned: Flame Malware
From ACM Opinion

What Have We Learned: Flame Malware

When the news about the Flame malware first broke several weeks ago, people from all parts of the security community, political world and elsewhere quickly began...

The Vulnerabilities Market and the Future of Security
From ACM Opinion

The Vulnerabilities Market and the Future of Security

Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...

How Depressives Surf the Web
From ACM News

How Depressives Surf the Web

In what way do you spend your time online? Do you check your email compulsively? Watch lots of videos? Switch frequently among multiple Internet applications—from...

Google's New Brain Could Have a Big Impact
From ACM News

Google's New Brain Could Have a Big Impact

A store of information dubbed the "Knowledge Graph" now adds useful context and detail to the list of links that Google serves up.

Desktop Computers Look More and More Like Smartphones
From ACM Opinion

Desktop Computers Look More and More Like Smartphones

If you're an experienced computer user, you probably remember explaining to newbies how a desktop computer worked: Your photos should go in this folder; your documents...

From ACM Opinion

Apple's Strategy of Built-In Obsolescence

Ross Miller made a good point about Apple's new flagship laptop, in his review for the Verge. Once you take into account that it has a solid-state drive, it's actually...

Researcher: Interdependencies Could Lead to Cloud 'meltdowns'
From ACM TechNews

Researcher: Interdependencies Could Lead to Cloud 'meltdowns'

As cloud computing becomes increasingly common, serious operational "meltdowns" could take place as end users and vendors mix, match, and bundle services for various...

World's Largest Organization For Computer Professionals Comes Out Against Cispa
From ACM Opinion

World's Largest Organization For Computer Professionals Comes Out Against Cispa

The U.S. Public Policy Council of the Association of Computing Machinery, representing ACM, came out against CISPA, the cybersecurity legislation recently passed...

Google Fights Back in China
From ACM News

Google Fights Back in China

Two giants on the world stage are battling over the future of information.

Apple's Stash of Credit Card Numbers Is Its Secret Weapon
From ACM News

Apple's Stash of Credit Card Numbers Is Its Secret Weapon

That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.

Is Flame Virus Fallout a Chinese, Russian Plot to Control the Internet?
From ACM Opinion

Is Flame Virus Fallout a Chinese, Russian Plot to Control the Internet?

Has the U.S. government been caught with its virtual hands in the world's cookie jar? And might it lose control of the Internet as a consequence?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account