acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

Graphic Designers Are Ruining the Web

What happens when you click on a Weblink? Here's one answer: A request goes from your computer to a server identified by the URL of the desired link. The server...

From ACM Opinion

Harvard Mapping My Dna Turns Scary as Threatening Gene Emerges

Four months after I walked into a lab at Harvard University and gave a vial of blood to have my genome sequenced, my search to understand my DNA led me to Mark...

From ACM Opinion

The Internet Is Broken; We Need to Start Over

Last year, the level and ferocity of cyberattacks on the Internet reached such a horrendous level that some are now thinking the unthinkable: let the Internet wither...

From ACM Opinion

Apple's Mountain Lion Makes the Mac More Like the Ipad

Apple's iPhones and iPads get most of the attention, but Apple is now directing the spotlight on the Mac.

Lightsquared Blew It, and Here's Why
From ACM Opinion

Lightsquared Blew It, and Here's Why

LightSquared may have had a great case for building its wireless network, but the fledgling company lacked the political tact to see it through.

From ACM Opinion

Researchers Detail Flaw in Online Cryptography, but Don't Panic

First, the bad news: A small number of active RSA public encryption keys, a popular type of encryption protocol that secures billions of online transactions, offer...

What Dropbox Can Teach ­S About Cloud Computing
From ACM Opinion

What Dropbox Can Teach ­S About Cloud Computing

Dropbox is the most deceptively simple of services.

The Mathematical Equation that Caused the Banks to Crash
From ACM Opinion

The Mathematical Equation that Caused the Banks to Crash

It was the holy grail of investors. The Black-Scholes equation, brainchild of economists Fischer Black and Myron Scholes, provided a rational way to price a financial...

From ACM Opinion

A Cyber Risk to the ­.s.

In a recent briefing to Congress about worldwide threats, FBI Director Robert S. Mueller III said that the danger of cyberattacks will equal or surpass the danger...

Apps For Ipad 3: What Apple Should Demo at the Grand ­nveiling
From ACM Opinion

Apps For Ipad 3: What Apple Should Demo at the Grand ­nveiling

All indicators suggest Apple will unveil the iPad 3 during the first week of March. That’s less than a month away, and sources at The Next Web say Apple is in "crunch...

Five Reasons The Robo-Car Haters Are Wrong
From ACM Opinion

Five Reasons The Robo-Car Haters Are Wrong

The self-driving cars we’ve been promised since the dawn of the auto age are here.

From ACM Opinion

Who Cares About Apple TV? Bring Us the Apple Car

The much-mythologized Apple television could be a terrible next step for the company.

From ACM Opinion

No Objections to Nano?

Some forms of biotechnology have become notoriously controversial. Genetic modification of crops, for example, altered the food supply in ways some consumers...

From ACM Opinion

How to Tackle Cybersecurity

There is a right way and a wrong way to address cybersecurity.

From ACM Opinion

It's Time to Stop Talking About the Apple Cult

Thirty-seven million iPhones. Fifteen million iPads. Fifteen million iPods. Five million Macs. A million Apple TVs. No matter how you do the math, that's a boatload...

From ACM Opinion

Yes We Scan

Locked in our federal vaults is a tremendous storehouse of information that if digitized would form a core for our digital public libraries in America with huge...

From ACM Opinion

Time For Robots to Get Real

From robotic slug-killers to dancing humanoids, there's a lot of media buzz around robots.

What Have We Learned About Software Engineering?
From Communications of the ACM

What Have We Learned About Software Engineering?

Upon closer examination, everything old appears to be new again in the realm of software engineering.

Emotion and Security
From Communications of the ACM

Emotion and Security

Examining the role of human emotional response in making complex security-related decisions.

Wanton Acts of Debuggery
From Communications of the ACM

Wanton Acts of Debuggery

Keep your debug messages clear, useful, and not annoying.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account