acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

Iran's Answer to Stuxnet

Might a "halal Internet" be in the wings?

Your Iphone Is Tracking You. So What.
From ACM Opinion

Your Iphone Is Tracking You. So What.

Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...

Electronic Health Records Face Human Hurdles More Than Technological Ones
From ACM News

Electronic Health Records Face Human Hurdles More Than Technological Ones

In medicine, there's the patient and there's the chart. And the chart is paper.

The Importance of Reviewing the Code
From Communications of the ACM

The Importance of Reviewing the Code

Highlighting the significance of the often overlooked underlying software used to produce research results.

Bell Labs and Centralized Innovation
From Communications of the ACM

Bell Labs and Centralized Innovation

In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...

Reaching Learners Beyond Our Hallowed Halls
From Communications of the ACM

Reaching Learners Beyond Our Hallowed Halls

Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.

Online Advertising, Behavioral Targeting, and Privacy
From Communications of the ACM

Online Advertising, Behavioral Targeting, and Privacy

Studying how privacy regulation might impact economic activity on the advertising-supported Internet.

Are You Following a Bot?
From ACM Opinion

Are You Following a Bot?

How to manipulate social movements by hacking Twitter.

The Web's Trust Issues
From ACM Opinion

The Web's Trust Issues

The most dubious phrase in English after "act natural" is "trust me." A party asking for trust without offering a reason why is probably untrustworthy. And yet...

Just How Creepy Is 'creepy'? A Test-Drive
From ACM News

Just How Creepy Is 'creepy'? A Test-Drive

You probably know that some Internet and cell phone applications like Foursquare or Twitter can broadcast your location to the world. And you might know that...

From ACM Opinion

China's War in Cyberspace, August

Strategic theorists frequently lament that military planners are very effective at preparing for the last war, not the next one. Planners today must cope with...

Asymmetries and Shortages of the Network Neutrality Principle
From Communications of the ACM

Asymmetries and Shortages of the Network Neutrality Principle

Since the beginning of the debate on network neutrality, and perhaps as an inheritance of that beginning, the controversy has been restricted...

Coder's Block
From Communications of the ACM

Coder's Block

Programming is a creative endeavor, and therefore there is such a thing as coder's block. What does it take to clear the blockage?

Platform Wars Come to Social Media
From Communications of the ACM

Platform Wars Come to Social Media

The world can absorb more social media sites, but how many?

Building Castles in the Air
From Communications of the ACM

Building Castles in the Air

Reflections on recruiting and training programmers during the early period of computing.

Managing Global IT Teams: Considering Cultural Dynamics
From Communications of the ACM

Managing Global IT Teams: Considering Cultural Dynamics

Successful global IT team managers combine general distributed team management skills enhanced with cultural sensitivity.

The Future of Things "cyber"
From ACM Opinion

The Future of Things "cyber"

Years ago, when I was an ROTC instructor, the first unit of instruction for rising juniors dealt with communication skills. Near the beginning of the unit, I...

No Moammar, No Fly: How to Stop Gadhafi
From ACM Opinion

No Moammar, No Fly: How to Stop Gadhafi

Keep the surveillance planes flying. Fry the radar. While the sun hangs in the sky, let Libya’s pilots know they’re on borrowed time if they take off.

Reply All: The Button Everyone Loves to Hate
From ACM Opinion

Reply All: The Button Everyone Loves to Hate

I answered my phone recently to hear a friend shrieking in my ear. "Check your inbox for the email I just sent you," he wailed. "And please, please tell me I...

From ACM Opinion

Gaming Social Networks For Influence and Propaganda

For a while now I have argued that the contemporary operating environment has two dimensions: "the first is the actual tactical field of battle in which bullets...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account