acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

How Flame Virus Has Changed Everything For Online Security Firms
From ACM Opinion

How Flame Virus Has Changed Everything For Online Security Firms

Here's a question: if you connect an unprotected Windows computer to the Internet, how long will it take before it is infected by malicious software?

Alan Turing: Why the Tech World's Hero Should Be a Household Name
From ACM Opinion

Alan Turing: Why the Tech World's Hero Should Be a Household Name

I've worked in computing, and more specifically computer networking, nearly all my life. It's an industry in a constant state of innovation, always pushing beyond...

How Depressives Surf the Web
From ACM News

How Depressives Surf the Web

In what way do you spend your time online? Do you check your email compulsively? Watch lots of videos? Switch frequently among multiple Internet applications—from...

Google's New Brain Could Have a Big Impact
From ACM News

Google's New Brain Could Have a Big Impact

A store of information dubbed the "Knowledge Graph" now adds useful context and detail to the list of links that Google serves up.

Desktop Computers Look More and More Like Smartphones
From ACM Opinion

Desktop Computers Look More and More Like Smartphones

If you're an experienced computer user, you probably remember explaining to newbies how a desktop computer worked: Your photos should go in this folder; your documents...

From ACM Opinion

Apple's Strategy of Built-In Obsolescence

Ross Miller made a good point about Apple's new flagship laptop, in his review for the Verge. Once you take into account that it has a solid-state drive, it's actually...

Google Fights Back in China
From ACM News

Google Fights Back in China

Two giants on the world stage are battling over the future of information.

Apple's Stash of Credit Card Numbers Is Its Secret Weapon
From ACM News

Apple's Stash of Credit Card Numbers Is Its Secret Weapon

That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.

From ACM News

Back to Stuxnet: The Missing Link

Two weeks ago, when we announced the discovery of the Flame malware we said that we saw no strong similarity between its code and programming style with that of ...

How To Fix the Gender Gap in Technology
From ACM Opinion

How To Fix the Gender Gap in Technology

The United States has produced viable female presidential candidates, women athletes who command millions of dollars in endorsements, and the first female Nobel...

Why Antivirus Companies Like Mine Failed to Catch Flame and Stuxnet
From ACM Opinion

Why Antivirus Companies Like Mine Failed to Catch Flame and Stuxnet

A couple of days ago, I received an e-mail from Iran. It was sent by an analyst from the Iranian Computer Emergency Response Team, and it was informing me about...

From ACM Opinion

Augmented Reality Offers a New Layer of Intrigue

If you ever come across a photograph of communist-era East Berlin, or modern Pyongyang in North Korea, the cityscapes look drab and featureless. Billboards, advertising...

Apple's Crystal Prison and the Future of Open Platforms
From ACM Opinion

Apple's Crystal Prison and the Future of Open Platforms

Two weeks ago, Steve Wozniak made a public call for Apple to open its platforms for those who wish to tinker, tweak and innovate with their internals. EFF supports...

From ACM Opinion

Facebook's Brilliant Disaster

So I guess you've heard about the recent initial public offering that didn't turn out the way it was supposed to. The company's Wall Street advisers misjudged the...

The Remote Control as Subversive Technology
From ACM Opinion

The Remote Control as Subversive Technology

Television began as a box.

Can Facebook 'monetize Eyeballs?'
From ACM Opinion

Can Facebook 'monetize Eyeballs?'

In the days of the Internet bubble of the mid to late 1990s, companies received millions of dollars of venture capital to offer products that weren't especially...

A Measure of Control
From Communications of the ACM

A Measure of Control

Some limitations on measurements in software.

The Cybersecurity Risk
From Communications of the ACM

The Cybersecurity Risk

Increased attention to cybersecurity has not resulted in improved cybersecurity.

Security of the Internet and the Known Unknowns
From Communications of the ACM

Security of the Internet and the Known Unknowns

Seeking answers to questions about Internet vulnerabilities.

The Myth of the Elevator Pitch
From Communications of the ACM

The Myth of the Elevator Pitch

Instead of pitching, listen and offer.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account