acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Could the Government Get a Search Warrant For Your Thoughts?
From ACM Opinion

Could the Government Get a Search Warrant For Your Thoughts?

We don't have a mind reading machine.

I'm Still Waiting For My Phone to Become My Wallet
From ACM Opinion

I'm Still Waiting For My Phone to Become My Wallet

During the sweltering heat wave earlier this month, it seemed too hot to wear much, carry much or do much of anything at all.

The Mooc Racket
From ACM Opinion

The Mooc Racket

The word mooc sounds a bit like slang from Goodfellas or the affectionate shortening of the already-affectionate name of a former outfielder for the New York Mets...

Technology to Protect Against Mass Surveillance
From ACM Opinion

Technology to Protect Against Mass Surveillance

In the past several weeks, EFF has received many requests for advice about privacy tools that provide technological shields against mass surveillance.

How Protecting Your Privacy Could Make You the Bad Guy
From ACM Opinion

How Protecting Your Privacy Could Make You the Bad Guy

There's a funny catch-22 when it comes to privacy best practices.

The Paradox of Wearable Technologies
From ACM Opinion

The Paradox of Wearable Technologies

Ever talk to someone at a party or conference reception only to discover that the person you are talking to is constantly scanning the room, looking this way and...

Did Facebook Miss a Massive Opportunity By Building a Walled Garden Instead of a Truly Open Platform?
From ACM Opinion

Did Facebook Miss a Massive Opportunity By Building a Walled Garden Instead of a Truly Open Platform?

When Facebook first launched its platform strategy in 2007, it seemed as though a new world of opportunity had opened up for anyone interested in the social web—a...

Money Models For MOOCs
From Communications of the ACM

Money Models For MOOCs

Considering new business models for massive open online courses.

The Air Gap
From Communications of the ACM

The Air Gap: SCADA's Enduring Security Myth

Attempting to use isolation as a security strategy for critical systems is unrealistic in an increasingly connected world.

Cherry-Picking and the Scientific Method
From Communications of the ACM

Cherry-Picking and the Scientific Method

Software is supposed be a part of computer science, and science demands proof.

Success in Introductory Programming
From Communications of the ACM

Success in Introductory Programming: What Works?

How pair programming, peer instruction, and media computation have improved computer science education.

Microsoft Is Doomed, But First It's Going to Make a Ton of Money
From ACM Opinion

Microsoft Is Doomed, But First It's Going to Make a Ton of Money

Microsoft stock lost about 10 percent of its value in the wake of a quarterly earnings report on Thursday that investors deemed sub-par. Yet revenue for the second...

Hands On the Wheel, Mind On the Road–not Cyberspace
From ACM Opinion

Hands On the Wheel, Mind On the Road–not Cyberspace

Makers of cars and mobile electronics are pushing a tempting vision of the future. It is one in which you can stay fully connected while driving.

E-Book Vs. P-Book
From ACM Opinion

E-Book Vs. P-Book

When Barnes & Noble announced, a couple of weeks ago, that its Nook division lost almost five hundred million dollars last year and that its C.E.O. was resigning...

Douglas Engelbart’s ­nfinished Revolution
From ACM Opinion

Douglas Engelbart’s ­nfinished Revolution

Doug Engelbart knew that his obituaries would laud him as "Inventor of the Mouse."

Nsa Can Reportedly Track Phones Even When They're Turned Off
From ACM Opinion

Nsa Can Reportedly Track Phones Even When They're Turned Off

The NSA has a diverse range of surveillance capabilities—from monitoring Google Maps use to sifting through millions of phone call records and spying on Web searches...

Your Creative, Open Hackathon Is Ripe For Legal Challenges
From ACM Opinion

Your Creative, Open Hackathon Is Ripe For Legal Challenges

NASA's Space Apps Challenge recently became the world's largest open hackathon, with over 8,000 participants spanning 44 countries.

Virtual Reality For Your Hands
From ACM Opinion

Virtual Reality For Your Hands

Computers already have keyboards. They have mice and touch pads. They even have touch screens. But is there room for a totally new interface?

Sebastian Thrun on the Future of Learning
From ACM Opinion

Sebastian Thrun on the Future of Learning

Sebastian Thrun has worn many hats in the tech world: Stanford research professor, founder of Google's X Labs, where he oversaw the development of self-drivingUdacity...

How to Be an Email Survivalist
From ACM Opinion

How to Be an Email Survivalist

In the early 2000s it was the height of geek fashion to run your own email server—then along came Gmail with two gigabytes of free storage and excellent spam filtering...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account