acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Why God Did Not Create the ­niverse
From ACM Opinion

Why God Did Not Create the ­niverse

There is a sound scientific explanation for the making of our world—no gods required.

Google's Earth
From ACM Opinion

Google's Earth

"I actually think most people don't want Google to answer their questions," said the search giant's chief executive, Eric Schmidt, in a recent and controversial...

Ban Drone-Porn War Crimes
From ACM Opinion

Ban Drone-Porn War Crimes

Death by joystick is immoral and illegal.

Is Wikileaks Too Full of Itself?
From ACM Opinion

Is Wikileaks Too Full of Itself?

Have the activists behind WikiLeaks—and in particular the Web site's founder, Julian Assange—become intoxicated by their own myth? Two recent events involving...

From ACM Opinion

Why Isn't There A Better Way to Text While Driving?

It's deadly. It's irresponsible. And we've all done it. Before you commute home think about this: Why isn't there a better solution to texting while driving.

From ACM Opinion

The Government Can ­se Gps to Track Your Moves

Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This...

From ACM Opinion

Grim Numbers Point to the End of the Venture Capital Era

Silicon Valley has passed an important milestone that may mark the end of one era and the beginning of another.

From ACM Opinion

Defending a New Domain: The Pentagon

Right now, more than 100 foreign intelligence organizations are trying to hack into the digital networks that undergird U.S. military operations. The Pentagon...

Future Internet Architecture: Clean-Slate Versus Evolutionary Research
From Communications of the ACM

Future Internet Architecture: Clean-Slate Versus Evolutionary Research

Should researchers focus on designing new network architectures or improving the current Internet?

Objects Never? Well, Hardly Ever!
From Communications of the ACM

Objects Never? Well, Hardly Ever!

Revisiting the Great Objects Debate.

Discussing Cyber Attack
From Communications of the ACM

Discussing Cyber Attack

Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.

Principles of the Law of Software Contracts
From Communications of the ACM

Principles of the Law of Software Contracts

An overview of a new set of legal principles for software contracts developed by the American Law Institute.

Return at Risk
From Communications of the ACM

Return at Risk

Calculating the likely true cost of projects.

From ACM Opinion

The Future Cloud Should Fend For Itself

It is fascinating the ways in which the world of computing can be made easier, thus creating opportunity for new complexities—usually in the form of new computing...

From ACM Opinion

Why Intel Bought Mcafee

There's been quite a bit of head-scratching over Intel's decision to purchase McAfee, but, despite all the breathless talk about mobile security and ARM and virus...

Facebook Knows Where You Are
From ACM Opinion

Facebook Knows Where You Are

The social network's new Places feature will make it more difficult to lie to your friends.

From ACM Opinion

Beloit College Mindset List For the Class of 2014

Born when Ross Perot was warning about a giant sucking sound and Bill Clinton was apologizing for pain in his marriage, members of this fall’s entering college...

From ACM Opinion

Location Services Show the Way to the Next Great Internet Bubble

When Silicon Valley misses the mark on a new technology, the problem usually is an issue of timing. It's not what is going to happen, but when it will happen...

Data Mining Is Shaping Our World. Are We Ready For It?
From ACM Opinion

Data Mining Is Shaping Our World. Are We Ready For It?

Each day we exchange a mess of content through Facebook, Twitter, blogs, discussion boards and other online forums. How are companies and other organizations using...

From ACM Opinion

Will Someone Leak the Leaker's Secrets?

Who has the right to decide what information should be kept secret? That's the vexatious question raised by WikiLeaks and its founder Julian Assange, who masterminded...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account