acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Apple's Power Over Design, in 4 Words
From ACM Opinion

Apple's Power Over Design, in 4 Words

"Apple just permeates everything."

The Taming of the Spook
From ACM Opinion

The Taming of the Spook

On March 24, 2009, the National Security Agency’s inspector general issued a 51-page draft report on the President’s Surveillance Program, the warrantless authority...

A Eulogy For Altavista, the Google of Its Time
From ACM Opinion

A Eulogy For Altavista, the Google of Its Time

Goodbye AltaVista. You deserved better than this. Better than the one-sentence send-off Yahoo gave you today, when announcing your July 8 closure date.

'maker Movement' Taps Deep and Rich Tradition
From ACM Opinion

'maker Movement' Taps Deep and Rich Tradition

Sometimes I worry we're becoming a culture of technology consumers, instead of creators.

Software Recognition Technology Is Amazing, but Not Amazing Enough
From ACM Opinion

Software Recognition Technology Is Amazing, but Not Amazing Enough

The gadget blogs may work themselves into a frenzy over megapixels and processor speed. But if you want to know what really dazzles the masses, consider a feature...

From ACM Opinion

Snowden, Through the Eyes of a Spy Novelist

For a spy novelist like me, the Edward J. Snowden story has everything. A man driven by ego and idealism—can anyone ever distinguish the two?—leaves his job and...

Connecting the Dots, Missing the Story
From ACM Opinion

Connecting the Dots, Missing the Story

Could Big Data have prevented 9/11? Perhaps—Dick Cheney, for one, seems to think so.

Mathematicians Think Like Machines For Perfect Proofs
From ACM News

Mathematicians Think Like Machines For Perfect Proofs


Ways to Make Your Online Tracks Harder to Follow
From ACM Opinion

Ways to Make Your Online Tracks Harder to Follow


The Most Amazing Map You'll See Today (no Matter What Day It Is)
From ACM News

The Most Amazing Map You'll See Today (no Matter What Day It Is)

There are many way to celebrate your 70th birthday.

Sorry, It's Not 1984
From ACM Opinion

Sorry, It's Not 1984

After leaker Edward Snowden revealed the existence of massive domestic-surveillance programs operated by the NSA, the airwaves were clotted with pundits and politicians...

From ACM Opinion

­.s. Offensive Cyberwar Policy

Today, the United States is conducting offensive cyberwar actions around the world.

What the Digital Brains of the Future Might Be Like
From ACM Opinion

What the Digital Brains of the Future Might Be Like

It is the rare entrepreneur who hits it truly big twice. Those who do—such as Ev Williams, Ted Turner, and Elon Musk—tend to stay within the original industry that...

Qr Codes Aren't Dead Yet
From ACM Opinion

Qr Codes Aren't Dead Yet

My favorite mobile device isn't my phone, my iPad, or my car. It's my Canon digital SLR camera.

Phew, Nsa Is Just Collecting Metadata. (you Should Still Worry)
From ACM Opinion

Phew, Nsa Is Just Collecting Metadata. (you Should Still Worry)

We now know that every day, U.S. phone companies quietly send the government a list of who called whom and when—"telephony metadata"—for every call made on their...

The German Prism: Berlin Wants to Spy Too
From ACM Opinion

The German Prism: Berlin Wants to Spy Too

Just a few days ago, the man whom many Germans now see as one of the greatest villains in the world visited Berlin.

I Would Have Hired Edward Snowden
From ACM Opinion

I Would Have Hired Edward Snowden

I don't know Edward Snowden, but I know his kind.

Tech Moves to the Background as Design Becomes Foremost
From ACM Opinion

Tech Moves to the Background as Design Becomes Foremost

In the last few decades, the computing industry has passed through several different eras.

The Prism
From ACM Opinion

The Prism

An extraordinary fuss about eavesdropping started in the spring of 1844, when Giuseppe Mazzini, an Italian exile in London, became convinced that the British government...

From ACM Opinion

Microsoft's ­.s. Law Enforcement and National Security Requests For Last Half of 2012

This afternoon we are publishing additional information about the volume of law enforcement and national security orders served on Microsoft. For the first time...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account