acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Author Order: What Science Can Learn from the Arts
From Communications of the ACM

Author Order: What Science Can Learn from the Arts

Some thoughts about author order in research papers.

Alan and I
From Communications of the ACM

Alan and I

A personal account of Alan Turing's life and impact.

Will the Next Election Be Hacked?
From ACM Opinion

Will the Next Election Be Hacked?

Two years ago, hackers gained access to an online voting system created by the District of Columbia and altered every ballot on behalf of their own preferred candidates...

There's Only One Truly Open Platform: The Web
From ACM Opinion

There's Only One Truly Open Platform: The Web

As Twitter and Facebook continue to fight a variety of skirmishes in the ongoing "platform wars," with both companies trying to control as much of their networks...

Why High-Frequency Trading Doesn't Compute
From ACM Opinion

Why High-Frequency Trading Doesn't Compute

Wall Street is no autobahn. Traders pushing pedal to the metal risk hurtling into the Buttonwood Trees.

Trust: Ill-Advised in a Digital Age
From ACM Opinion

Trust: Ill-Advised in a Digital Age

Bruce Schneieer ordered a Coke, no ice, at the Rio casino on a Saturday afternoon. I ordered Diet Coke, also no ice, and handed the bartender an American Express...

How Will Apple Restore Icloud Trust?
From ACM Opinion

How Will Apple Restore Icloud Trust?

After being on the receiving end of a truly awful hacking attack, Wired writer Mat Honan explained how it happened in detail. And he was very clear about two of...

How the Icloud Hack Happened and How to Avoid Being Next
From ACM Opinion

How the Icloud Hack Happened and How to Avoid Being Next

Mat Honan, the technology reporter who was digitally disemboweled this past weekend, has revealed exactly how he was so spectacularly owned. His case, a cascade...

Tired of Security Problems? Change Rules of Writing Code
From ACM TechNews

Tired of Security Problems? Change Rules of Writing Code

Security researcher Dan Kaminsky believes rethinking the basic rules of computer science can dramatically improve computer security, and argues that "there's not...

How Cyber Security Could Be a Winning Issue for Obama
From ACM Opinion

How Cyber Security Could Be a Winning Issue for Obama

A blackout in Manhattan. A major dam failure. Mayhem at a chemical plant. Those are all potential, and entirely plausible, consequences of a cyber attack, according...

How Apple and Amazon Security Flaws Led to My Epic Hacking
From ACM Opinion

How Apple and Amazon Security Flaws Led to My Epic Hacking

In the space of one hour, my entire digital life was destroyed.

Why Drone Pilots Deserve Medals
From ACM Opinion

Why Drone Pilots Deserve Medals

The escalating dependence on drone pilots, as Maj. Dave Blair agonized in the May-June issue ofAir & Space Power Journal, is undercutting the ability to award combat...

How Fbi Technology Woes Let Fort Hood Shooter Slip By
From ACM News

How Fbi Technology Woes Let Fort Hood Shooter Slip By

On November 5, 2009, an Army psychiatrist stationed at Fort Hood, Texas shot and killed 12 fellow soldiers and a civilian Defense Department employee while wounding...

The Frightening Things You Hear at a Black Hat Conference
From ACM Opinion

The Frightening Things You Hear at a Black Hat Conference

Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.

From ACM Opinion

The Public Is Left in the Dark When Courts Allow Electronic Surveillance

A big part of Magistrate Judge Stephen W. Smith's job in Federal District Court in Houston is to consider law enforcement requests for cellphone and email records...

The Ethics of Software Engineering Should Be an Ethics For the Client
From Communications of the ACM

The Ethics of Software Engineering Should Be an Ethics For the Client

Viewing software engineering as a communicative art in which client engagement is essential.

Internet Elections
From Communications of the ACM

Internet Elections: Unsafe in Any Home?

Experiences with electronic voting suggest elections should not be conducted via the Internet.

The Internet Is Everywhere, but the Payoff Is Not
From Communications of the ACM

The Internet Is Everywhere, but the Payoff Is Not

Examining the uneven patterns of Internet economics.

A System Is Not a Product
From Communications of the ACM

A System Is Not a Product

Stopping to smell the code before wasting time reentering configuration data.

The Politics of 'Real Names'
From Communications of the ACM

The Politics of 'Real Names'

Power, context, and control in networked publics.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account