acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Bitcoin Is Broken
From ACM Opinion

Bitcoin Is Broken

And not just superficially so, but fundamentally, at the core protocol level.

Is Google Autocomplete Evil?
From ACM Opinion

Is Google Autocomplete Evil?

"Women shouldn't have rights." "Women shouldn't vote." "Women shouldn't work."

Report on Government Information Requests
From ACM Opinion

Report on Government Information Requests

We believe that our customers have a right to understand how their personal information is handled, and we consider it our responsibility to provide them with the...

Should We Believe More in Big Data or in Magic?
From ACM Opinion

Should We Believe More in Big Data or in Magic?

One year I spent a lot of time with professional magicians.

A Force For Face-to-Face Communication
From ACM Opinion

A Force For Face-to-Face Communication

Clifford I. Nass, a professor of communication at Stanford who died on Saturday, regaled me several times over the years about his method for torturing students...

How Steve Jobs Made the Ipad Succeed When All Other Tablets Failed
From ACM Opinion

How Steve Jobs Made the Ipad Succeed When All Other Tablets Failed

Steve Jobs's solution to Google's Android-everywhere strategy was simple and audacious: he unveiled the iPad.

Why the Googlification of Obamacare Really Matters
From ACM Opinion

Why the Googlification of Obamacare Really Matters

The Internet is piling yet more vitriol on the shoddy Obamacare rollout in response to a report, by Bloomberg's Alex Wayne, that the administration has recruited...

Fifth Amendment Prohibits Compelled Decryption, New EFF Brief Argues
From ACM Opinion

Fifth Amendment Prohibits Compelled Decryption, New EFF Brief Argues

Encryption is one of the most important ways to safeguard data from prying eyes.

Merkel Balks at E­ Privacy Push
From ACM Opinion

Merkel Balks at E­ Privacy Push

Chancellor Merkel has put on a good show of being outraged by American spying.

Why We Should Think About the Threat of Artificial Intelligence
From ACM Opinion

Why We Should Think About the Threat of Artificial Intelligence

If the New York Times's latest article is to be believed, artificial intelligence is moving so fast it sometimes seems almost "magical."

Driverless Cars Are Further Away Than You Think
From ACM Opinion

Driverless Cars Are Further Away Than You Think

A silver BMW 5 Series is weaving through traffic at roughly 120 kilometers per hour (75 mph) on a freeway that cuts northeast through Bavaria between Munich and...

Is Ad Avoidance a Problem?
From ACM Opinion

Is Ad Avoidance a Problem?

Back in the twentieth century, people were roughly equal in their power to avoid advertising.

Intelligence Chief Clapper Cites 'casablanca' in Dismissing Merkel Mess
From ACM News

Intelligence Chief Clapper Cites 'casablanca' in Dismissing Merkel Mess

You must remember this: A kiss is just a kiss, a spy is just a spy.

All Can Be Lost: The Risk of Putting Our Knowledge in the Hands of Machines
From ACM Opinion

All Can Be Lost: The Risk of Putting Our Knowledge in the Hands of Machines

On the evening of February 12, 2009, a Continental Connection commuter flight made its way through blustery weather between Newark, New Jersey, and Buffalo, New...

The Information-Gathering Paradox
From ACM Opinion

The Information-Gathering Paradox

Consumer trust is a vital currency for every big Internet company, which helps to explain why the giants of Silicon Valley have gone to great lengths in recent...

Are Smartphones Turning ­s Into Bad Samaritans?
From ACM Opinion

Are Smartphones Turning ­s Into Bad Samaritans?

In late September, on a crowded commuter train in San Francisco, a man shot and killed 20-year-old student Justin Valdez.

The Battle For Power on the Internet
From ACM Opinion

The Battle For Power on the Internet

We're in the middle of an epic battle for power in cyberspace.

Why Apple Wants Its Software to Be Free
From ACM Opinion

Why Apple Wants Its Software to Be Free

Who knew Apple would become such a big shareware company?

How to Design—and Defend Against—the Perfect Security Backdoor
From ACM Opinion

How to Design—and Defend Against—the Perfect Security Backdoor

We already know the NSA wants to eavesdrop on the Internet. 

From ACM Opinion

As We May Type

In 1984, the personal-computer industry was still small enough to be captured, with reasonable fidelity, in a one-volume publication, the Whole Earth Software Catalog...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account