acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

Eff to Court: Don't Let Government Hide Illegal Surveillance

The Electronic Frontier Foundation urged the 9th U.S. Circuit Court of Appeals yesterday to preserve lawsuits challenging the government's illegal mass surveillance...

Technology Is Our Friend... Except When It Isn't
From ACM Opinion

Technology Is Our Friend... Except When It Isn't

The technology in question starts with "gigapixel" photography. Gigapixel photos are giant panoramas that themselves consist of hundreds of component mega-pixel...

Arrogance in Business Planning
From Communications of the ACM

Arrogance in Business Planning

Technology business plans that assume no competition — ever.

Realizing the Value of Social Media Requires Innovative Computing Research
From Communications of the ACM

Realizing the Value of Social Media Requires Innovative Computing Research

How social media are expanding traditional research and development topics for computer and information scientists.

Managing Time, Part 2
From Communications of the ACM

Managing Time, Part 2

Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.

Corporate Social Responsibility and Global IT Outsourcing
From Communications of the ACM

Corporate Social Responsibility and Global IT Outsourcing

How to improve IT outsourcing relationships while doing good for society.

In Praise of 'Wilkes, Wheeler, and Gill'
From Communications of the ACM

In Praise of 'Wilkes, Wheeler, and Gill'

Sixty years ago, Maurice Wilkes, David Wheeler, and Stanley Gill produced the first textbook on programming: The Preparation of Programs for an Electronic Digital...

Remix Nation
From Communications of the ACM

Remix Nation

Assessing the threat the anticircumvention provisions of the Digital Millennium Copyright Act pose for fair use.

Why Cctv Has Failed to Deter Criminals
From ACM Opinion

Why Cctv Has Failed to Deter Criminals

I've lost track of the number of people who've asked me to comment on David Cameron's insane plan to cripple Britain's Internet in times of civil unrest by blocking...

From ACM Opinion

What Constitutes an Act of Cyberwar?

Before we get to that, there's a clue in the spelling of the word: cyberwar instead of cyber war. The U.S. Defense Department has determined that cyber is a fifth...

From ACM News

Encrypt the Web with Https Everywhere

The Electronic Frontier Foundation, in collaboration with the Tor Project, has launched an official 1.0 version of HTTPS Everywhere, a tool for the Firefox Web...

From ACM News

Shady Rat Hacking Is Not About China

Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...

'i Fear the Net Will Soon Become a War Zone'
From ACM Opinion

'i Fear the Net Will Soon Become a War Zone'

Evgeny Kaspersky is one of Russia's top Internet virus hunters. In an interview, he discusses a raft of recent hacker attacks on multinationals, the "total professionals"...

From ACM News

Decoding Your Email Personality

Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...

It's Time To Cut Back On 'hack'
From ACM Opinion

It's Time To Cut Back On 'hack'

It's time to re-examine how we use, or overuse, the words "hack" and "hacker." They're relied on far too often to describe all kinds of activities that don't...

From ACM News

Welcome to the Age of the Splinternet

Openness is the Internet's great strength—and weakness. With powerful forces carving it up, is its golden age coming to an end?

From ACM Opinion

Leadership of Cyber Warriors

Leadership is a core competency of the officers, warrant officers, and non-commissioned officers across the military services. A principle tenant of leadership...

Journals For Certification, Conferences For Rapid Dissemination
From Communications of the ACM

Journals For Certification, Conferences For Rapid Dissemination

The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice...

Storage Strife
From Communications of the ACM

Storage Strife

Beware keeping data in binary format.

As Simple As Possible ? But Not More So
From Communications of the ACM

As Simple As Possible ? But Not More So

An assessment of the U.S. government's EINSTEIN project.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account