acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Institutional Review Boards and Your Research
From Communications of the ACM

Institutional Review Boards and Your Research

Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...

Intel's Rebates: Above Board or Below the Belt?
From Communications of the ACM

Intel's Rebates: Above Board or Below the Belt?

Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...

Plotting Away
From Communications of the ACM

Plotting Away

Dear KV, I've been working with some code that generates massive data sets, and . . . I'm finding that more and more often I...

The Resurgence of Parallelism
From Communications of the ACM

The Resurgence of Parallelism

Parallel computation is making a comeback after a quarter century of neglect. Past research can be put to quick use today.

Privacy By Design: Moving From Art to Practice
From Communications of the ACM

Privacy By Design: Moving From Art to Practice

Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...

Myths and Fallacies of 'Personally Identifiable Information'
From Communications of the ACM

Myths and Fallacies of 'Personally Identifiable Information'

Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...

From Facebook, Answering Privacy Concerns with New Settings
From ACM Opinion

From Facebook, Answering Privacy Concerns with New Settings

Six years ago, we built Facebook around a few simple ideas. People want to share and stay connected with their friends and the people around them. If we give people...

From ACM Opinion

The Death of the Open Web

The Web is a teeming commercial city. It's haphazardly planned. Its public spaces are mobbed, and signs of urban decay abound in broken links and abandoned projects...

How the ­.s. Military Can Win the Robotic Revolution
From ACM Opinion

How the ­.s. Military Can Win the Robotic Revolution

One of the great conundrums of war and technology is the odd fact that there is no such thing as a permanent first-mover advantage.

The Cyborg Insects Are Coming!
From ACM Opinion

The Cyborg Insects Are Coming!

Telepathic helmets. Grid-computing swarms of cyborg insects, some for surveillance, some with lethal stingers. New cognitive-enhancement drugs. (What? AdderallProvigil...

From ACM Opinion

Web Browsers Leave 'fingerprints' Behind as You Surf the Net

New research by the Electronic Frontier Foundation (EFF) has found that an overwhelming majority of web browsers have unique signatures--creating identifiable "fingerprints"...

Why Publishers Should Beware the App Store
From ACM Opinion

Why Publishers Should Beware the App Store

In a brilliant column published 16 years ago, the Italian philosopher Umberto Eco explained the difference between Apple and Microsoft in terms of the divide between...

From ACM Opinion

Immigration and Ids: A Modest Proposal

All Americans--whether brown, white, or black--should be required to carry a passport showing they are red, white, and blue.

From ACM TechNews

Html: Still Not All It's Cracked ­p to Be

The headaches of Web application development are being compounded by the ever-proliferating morass of Web standards, frameworks, and tools.

10 Reasons Why Android Will Dominate the Mobile Market
From ACM Opinion

10 Reasons Why Android Will Dominate the Mobile Market

Google's Android mobile operating system platform has outsold the iPhone in the first quarter of 2010 according to The NPD Group, a consumer market research and...

Sociologists Invade World of Warcraft, See Humanity's Future
From ACM Opinion

Sociologists Invade World of Warcraft, See Humanity's Future

In their continued quest to plumb the mysterious depths of human interactions, some sociologists have stopped watching people—and started watching their avatars...

Just How Fragile Is the Internet?
From ACM Opinion

Just How Fragile Is the Internet?

In 1998, a hacker told Congress that he could bring down the Internet in 30 minutes by exploiting a certain flaw that sometimes caused online outages. In 2003...

From ACM Opinion

Apple: The Microsoft of Mobile?

Apple could soon be the target of an antitrust investigation by either the Federal Trade Commission or the Department of Justice, according to numerous press reports...

Interview With Dr. Bruno Bachimont
From ACM Opinion

Interview With Dr. Bruno Bachimont

Bruno Bachimont, scientific advisor of the Department of Research and Innovation at France's Institut National de l'Audiovisuel, discusses the constructive mix...

From ACM Opinion

Rest in Peas: The ­nrecognized Death of Speech Recognition

The accuracy of computer speech recognition flat-lined in 2001, before reaching human levels. The funding plug was pulled, but no funeral, no text-to-speech eulogy...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account