acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Last Call For Bad Calls
From ACM Opinion

Last Call For Bad Calls

Technology will soon make officials at high-level sports events as obsolete as elevator operators, their skill set as useful as knowing how to make a wood tennis...

Everything We Know About How the Nsa Tracks People's Physical Location
From ACM News

Everything We Know About How the Nsa Tracks People's Physical Location

Glenn Greenwald is back reporting about the NSA, now with Pierre Omidyar's news organization FirstLook and its introductory publication, The Intercept.

Science Inches Closer to Real Bioshock-Style Plasmids
From ACM Opinion

Science Inches Closer to Real Bioshock-Style Plasmids

Synthetic success. That's not to say that customized transposons are limited to the hypothetical.

Bitcoin's Political Problem
From ACM Opinion

Bitcoin's Political Problem

Money is always political.

Why Tech Companies and the NSA Diverge on Snowden
From ACM Opinion

Why Tech Companies and the NSA Diverge on Snowden

Is Edward Snowden a whistleblower or a traitor?

The Case of the Hacked Refrigerator—could 'the Internet of Things' Connect Everything?
From ACM Opinion

The Case of the Hacked Refrigerator—could 'the Internet of Things' Connect Everything?

Somebody hacked a refrigerator recently, and it could mark a tipping point for civilization.

Bitcoin: How Its Core Technology Will Change the World
From ACM Opinion

Bitcoin: How Its Core Technology Will Change the World

Bitcoin has been called many things, from the future of money to a drug dealer's dream and everything else in between.

How to Create the Perfect Online Dating Profile, in 25 Infographics
From ACM Opinion

How to Create the Perfect Online Dating Profile, in 25 Infographics

Every day, millions of singles crawl dating sites and apps, flipping through photos and profiles of potential matches.

Why Google Kept Motorola's Research Lab
From ACM Opinion

Why Google Kept Motorola's Research Lab

Google's $2.9 billion sale of Motorola Mobility to Chinese PC maker Lenovo might seem like lousy business, given Google's $12.5 billion purchase in 2012 and losses...

Microsoft Ceo Nadella's Top Challenge: Figuring Out Mobile
From ACM Opinion

Microsoft Ceo Nadella's Top Challenge: Figuring Out Mobile

Microsoft stands at a crossroads when it comes to mobile.

Judges Poised to Hand ­.s. Spies the Keys to the Internet
From ACM Opinion

Judges Poised to Hand ­.s. Spies the Keys to the Internet

How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites?

Through a Face Scanner Darkly
From ACM Opinion

Through a Face Scanner Darkly

Anonymity forms a protective casing.

When Big Data Marketing Becomes Stalking
From ACM Opinion

When Big Data Marketing Becomes Stalking

Many of us now expect our online activities to be recorded and analyzed, but we assume the physical spaces we inhabit are different.

Here's Why Tech Companies' Nsa 'transparency Reports' Are Mostly a Pr Stunt
From ACM Opinion

Here's Why Tech Companies' Nsa 'transparency Reports' Are Mostly a Pr Stunt

Technology companies will soon be able to disclose more details about the number of national security orders and requests they receive, according to a joint statement...

Bitcoin and the Fictions of Money
From ACM Opinion

Bitcoin and the Fictions of Money

How should we think about a currency like Bitcoin?

I See You: The Databases That Facial-Recognition Apps Need to Survive
From ACM Opinion

I See You: The Databases That Facial-Recognition Apps Need to Survive

Privacy concerns have been ignited by "NameTag," a facial-recognition app designed to reveal personal information after analyzing photos taken on mobile devices...

Ready Technology
From Communications of the ACM

Ready Technology

Fast-tracking emerging business technologies.

Digital Platforms
From Communications of the ACM

Digital Platforms: When Is Participation Valuable?

Assessing the benefits and challenges of knowledge spillovers.

Bugs and Bragging Rights
From Communications of the ACM

Bugs and Bragging Rights

It is not always size that matters.

An Integrated Approach to Safety and Security Based on Systems Theory
From Communications of the ACM

An Integrated Approach to Safety and Security Based on Systems Theory

Applying a more powerful new safety methodology to security risks.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account