acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

This One Thing Could Hurt Apple's Case in Washington
From ACM Opinion

This One Thing Could Hurt Apple's Case in Washington

Apple's fight with the FBI is widening beyond the courts.

How Tim Cook Aims to Profit from Protecting Privacy
From ACM Opinion

How Tim Cook Aims to Profit from Protecting Privacy

Would you stop buying Apple's products if it decided to help the FBI open a terrorist's iPhone?

If Apple Aids Terrorists and the Fbi Is Big Brother… Whom Do We Root For?
From ACM Opinion

If Apple Aids Terrorists and the Fbi Is Big Brother… Whom Do We Root For?

There's been a lot of bluster about the ongoing encryption saga between the FBI and Apple.

An Interview with Stanford University President John Hennessy
From Communications of the ACM

An Interview with Stanford University President John Hennessy

Stanford University President John Hennessy discusses his academic and industry experiences in Silicon Valley with UC Berkeley CS Professor David Patterson.

Paper Presentation at Conferences
From Communications of the ACM

Paper Presentation at Conferences: Time For a Reset

Seeking an improved paper presentation process.

Riding and Thriving on the API Hype Cycle
From Communications of the ACM

Riding and Thriving on the API Hype Cycle

Guidelines for the enterprise.

The Need For Research in Broadening Participation
From Communications of the ACM

The Need For Research in Broadening Participation

In addition to alliances created for broadening participation in computing, research is required to better utilize the knowledge they have produced.

Fifty Years of Operating Systems
From Communications of the ACM

Fifty Years of Operating Systems

A recent celebration of 50 years of operating system research yields lessons for all professionals in designing offers for their clients.

The Question of Information Justice
From Communications of the ACM

The Question of Information Justice

Information justice is both a business concern and a moral question.

New Exemptions to Anti-Circumvention Rules
From Communications of the ACM

New Exemptions to Anti-Circumvention Rules

Allowing some reverse engineering of technical measures for non-infringing purposes.

Telegraph to the Iphone: A Short History of Corporate Defiance
From ACM Opinion

Telegraph to the Iphone: A Short History of Corporate Defiance

The high-stakes stalemate between Apple and the Justice Department isn’t the first time that Washington and Silicon Valley have come to a showdown over security...

Apple's Fbi Battle Is Complicated. Here's What's Really Going On
From ACM News

Apple's Fbi Battle Is Complicated. Here's What's Really Going On

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and...

The Apple Fight Isn't About Encryption
From ACM Opinion

The Apple Fight Isn't About Encryption

The most striking aspect of Apple's message to customers on Tuesday wasn't the rejection of U.S. authorities' demand that the company help them break the encryption...

Eff to Support Apple in Encryption Battle
From ACM Opinion

Eff to Support Apple in Encryption Battle

We learned on Tuesday evening that a U.S. federal magistrate judge ordered Apple to backdoor an iPhone that was used by one of the perpetrators of the San Bernardino...

Is D-Wave's Quantum Processor Really 10⁸ Times Faster Than a Normal Computer?
From ACM Opinion

Is D-Wave's Quantum Processor Really 10⁸ Times Faster Than a Normal Computer?

We have been following D-Wave's claims about its quantum hardware at Ars for a number of years. Over that time, my impression has oscillated between skepticism,...

Having a Conversation About Bulk Surveillance
From Communications of the ACM

Having a Conversation About Bulk Surveillance

Considering a controversial subject that extends far beyond the collection of phone metadata.

Lessons from the Tech Transfer Trenches
From Communications of the ACM

Lessons from the Tech Transfer Trenches

Moving from the research realm to real-world business application.

Code Hoarding
From Communications of the ACM

Code Hoarding

Committing to commits, and the beauty of summarizing graphs.

Broadening Access to Computing Education State By State
From Communications of the ACM

Broadening Access to Computing Education State By State

Influencing computer science education at the state level.

Privacy Research Directions
From Communications of the ACM

Privacy Research Directions

What must we learn in order to support privacy requirements as technology advances?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account