acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From Gamification to Intelligence Amplification to The Singularity
From ACM Opinion

From Gamification to Intelligence Amplification to The Singularity

I've been thinking about the combination of artificial intelligence and intelligence amplification and specifically the symbiosis of these two things. And the...

From ACM News

The Auteur vs. the Committee

At Apple, one is the magic number.

Art That Interacts If You Interface
From ACM Opinion

Art That Interacts If You Interface

The Museum of Modern Art’s "Talk to Me: Design and the Communication Between People and Objects" is one of the smartest design shows in years—by which I mean...

Why Cloud Computing Must Evolve
From ACM Opinion

Why Cloud Computing Must Evolve

The marked increase in the use of the Internet for accessing computing resources will necessitate an evolution in the cloud computing network.

Bob Young on Collaboration, Innovation, and Standing on the Shoulders of Giants
From ACM Opinion

Bob Young on Collaboration, Innovation, and Standing on the Shoulders of Giants

Bob Young knows about open source and innovation. He's co-founder and former CEO of Red Hat. Founder and CEO of Lulu. Here are the lessons he's learned from open...

Could Google Have Caught the Norway Killer?
From ACM Opinion

Could Google Have Caught the Norway Killer?

The Norway killer allegedly spent 200 hours searching the Internet for 'how to make a bomb.' Could Google have traced him?

Existence: Am I a Hologram?
From ACM Opinion

Existence: Am I a Hologram?

Take a look around you. The walls, the chair you're sitting in, your own body—they all seem real and solid. Yet there is a possibility that everything we see...

How a Hashtag Changed My Philosophy on Life
From ACM Opinion

How a Hashtag Changed My Philosophy on Life

Twitter users have a way of self-identifying gratuitous complaints they make. They use the hashtag first-world problems. As in, "I can't believe Netflix is doubling...

Why People Phone Hack; a Look Into the Psyche of Wrongdoing
From ACM Opinion

Why People Phone Hack; a Look Into the Psyche of Wrongdoing

University of Alabama at Birmingham social psychologist Rex A. Wright explains why some people do not view phone hacking as unethical and why those that see it...

Nature's Hidden Prime Number Code
From ACM Opinion

Nature's Hidden Prime Number Code

Ever since humans evolved on this planet we have been trying to make sense of the world around us. We have attempted to explain why the world looks and behaves...

From ACM News

Can We Make Machines Listen More Carefully?

You probably use voice recognition technology already, if in a limited capacity. Maybe you use Google's voice-activated search, or take advantage of its (somewhat...

'i Fear the Net Will Soon Become a War Zone'
From ACM Opinion

'i Fear the Net Will Soon Become a War Zone'

Evgeny Kaspersky is one of Russia's top Internet virus hunters. In an interview, he discusses a raft of recent hacker attacks on multinationals, the "total professionals"...

From ACM News

Decoding Your Email Personality

Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...

It's Time To Cut Back On 'hack'
From ACM Opinion

It's Time To Cut Back On 'hack'

It's time to re-examine how we use, or overuse, the words "hack" and "hacker." They're relied on far too often to describe all kinds of activities that don't...

Why Twitter Should Double Its Character Limit
From ACM Opinion

Why Twitter Should Double Its Character Limit

Five years ago this month, Twitter opened itself up to the public. The new service, initially called Twttr, was born out of software engineer Jack Dorsey's fascination...

From ACM News

Welcome to the Age of the Splinternet

Openness is the Internet's great strength—and weakness. With powerful forces carving it up, is its golden age coming to an end?

From ACM Opinion

The Internet of Things (infographic)

When we think of being connected to the Internet, our minds immediately shift to our computers, phones, and most recently tablets. This week at Cisco live, I...

From ACM Opinion

Leadership of Cyber Warriors

Leadership is a core competency of the officers, warrant officers, and non-commissioned officers across the military services. A principle tenant of leadership...

Journals For Certification, Conferences For Rapid Dissemination
From Communications of the ACM

Journals For Certification, Conferences For Rapid Dissemination

The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice...

Storage Strife
From Communications of the ACM

Storage Strife

Beware keeping data in binary format.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account