acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Countering Tech's Damaging Effect on Jobs
From ACM Opinion

Countering Tech's Damaging Effect on Jobs

Advances in information and communications technology are destroying more jobs in advanced economies than the advances are creating. This poses a political challenge...

The Adultery Arms Race
From ACM Opinion

The Adultery Arms Race

Jay's wife, Ann, was supposed to be out of town on business.

Why Germans Are Afraid of Google
From ACM Opinion

Why Germans Are Afraid of Google

These days Germany is known for being many things: a leader in clean technology, a manufacturing powerhouse, Europe's foreign policy center.

Find Out What Your Zip Code Predicts You'll Buy
From ACM Opinion

Find Out What Your Zip Code Predicts You'll Buy

Where you live says a lot about you—and nobody knows that better than marketeers. Now, though, you can take a glimpse at what they know, using this searchable map...

The Myth of the Lone Genius
From ACM Opinion

The Myth of the Lone Genius

The computer and the Internet are among the most important inventions of our era, but few people know who created them.

Should We Tailor Difficulty of a School Text to Child's Comfort Level or Make Them Sweat?
From ACM Opinion

Should We Tailor Difficulty of a School Text to Child's Comfort Level or Make Them Sweat?

"A man who traveled from Liberia to visit family members in Texas tested positive for Ebola on Tuesday, marking the outbreak's first diagnosis outside of Africa...

The Planning Machine
From ACM Opinion

The Planning Machine

In June, 1972, Ángel Parra, Chile’s leading folksinger, wrote a song titled "Litany for a Computer and a Baby About to Be Born."

The Fourth Major Era of Computing Kicks In
From ACM Opinion

The Fourth Major Era of Computing Kicks In

With mobile users now outnumbering desktop users, a new economic cycle has begun.

The Nsa and Me
From ACM Opinion

The Nsa and Me

The tone of the answering machine message was routine, like a reminder for a dental appointment. But there was also an undercurrent of urgency.

Every Computer System Can Be Compromised
From ACM Opinion

Every Computer System Can Be Compromised

Unfortunately, there are many risks inherent in online banking and debit cards.

We Want Privacy, but Can't Stop Sharing
From ACM Opinion

We Want Privacy, but Can't Stop Sharing

Imagine a world suddenly devoid of doors.

How Humans Could Inhabit the Solar System
From ACM Opinion

How Humans Could Inhabit the Solar System

With our rising planet's population competing for space and resources, some people are convinced we need to look beyond Earth to help ensure humanity's survival...

The Google Formula For Success
From ACM Careers

The Google Formula For Success

Can Google’s winning ways be applied to all kinds of businesses?

Cyborgs: The Truth About Human Augmentation
From ACM Opinion

Cyborgs: The Truth About Human Augmentation

At the height of summer, when London was baking in unseasonable heat, I made an ill-fated trip to the Serpentine lido in central London.

The Toughest Case: What If Osama Bin Laden Had an Iphone?
From ACM Opinion

The Toughest Case: What If Osama Bin Laden Had an Iphone?

In rebuking Apple and Google for their new smartphone encryption polices on Thursday, FBI Director James B. Comey became the latest law enforcement official to...

A Turing Tale
From Communications of the ACM

A Turing Tale

Assessing the accuracy of popular descriptions of Alan Turing's influences and legacy.

Disrupting and Transforming the -University
From Communications of the ACM

Disrupting and Transforming the -University

Higher education institutions must modify their business models in response to technology-driven influences.

Vendor: Vidi, Vici
From Communications of the ACM

Vendor: Vidi, Vici

Some hidden costs of outsourcing.

Outsourcing Responsibility
From Communications of the ACM

Outsourcing Responsibility

What do you do when your debugger fails you?

Risks and Myths of Cloud Computing and Cloud Storage
From Communications of the ACM

Risks and Myths of Cloud Computing and Cloud Storage

Considering existing and new types of risks inherent in cloud services.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account