Sign In

Communications of the ACM

Articles


Recent Articles


How WWI Codebreakers Taught Your Gas Meter to Snitch on You
From ACM Opinion

How WWI Codebreakers Taught Your Gas Meter to Snitch on You

In the depths of night on August 5th 1914 the British Cable Ship Alert took the first significant action of World War I, severing the five German submarine cables...

Little Green Men Might Not Be So 'Green'
From ACM Opinion

Little Green Men Might Not Be So 'Green'

Humans are affecting the Earth’s systems on a global scale. Industrial pollutants are accumulating in our atmosphere with the potential for long-term impact on...

Security Secrets, Dated but Real
From ACM Opinion

Security Secrets, Dated but Real

Was the National Cryptologic Museum designed using a code of some kind?

The Data Centers of Tomorrow Will Use the Same Tech Our Phones Do
From ACM Opinion

The Data Centers of Tomorrow Will Use the Same Tech Our Phones Do

The mobile revolution has spread beyond the mini supercomputers in our hands all the way to the data center.

A Tool That Answers 'What's That Typeface?'
From ACM Opinion

A Tool That Answers 'What's That Typeface?'

The Internet is, from its very core to its most distant peripheries, a vast universe of text.

The Weird Reasons Why People Make Up False Identities on the Internet
From ACM Opinion

The Weird Reasons Why People Make Up False Identities on the Internet

Sockpuppetry—using false identities for deception—is centuries old, but the advent of the web has made creating sockpuppets, and falling for their tricks, easier...

Why Is Science Fiction So Hard to Define?
From ACM Opinion

Why Is Science Fiction So Hard to Define?

Time Out, the weekly listings magazine, recently ranked the 100 best sci-fi movies of all time.

Google Bets a Billion Dollars on Twitch
From ACM Opinion

Google Bets a Billion Dollars on Twitch

Video gaming differentiates itself from the older forms of escapism—literature, theatre, film, television—with interactivity.

How to Invent a Person Online
From ACM Opinion

How to Invent a Person Online

On April 8, 2013, I received an envelope in the mail from a nonexistent return address in Toledo, Ohio.

When Robots Come for Our Jobs, Will We Be Ready to Outsmart Them?
From ACM Opinion

When Robots Come for Our Jobs, Will We Be Ready to Outsmart Them?

Non-human employees are filling positions in all sorts of workplaces, and they are proving themselves to be fast, accurate, and reliable—more so than their human...

How the U.S. Stumbled Into the Drone Era
From ACM Opinion

How the U.S. Stumbled Into the Drone Era

On Sept. 7, 2000, in the waning days of the Clinton administration, a U.S. Predator drone flew over Afghanistan for the first time.

The Next Big Thing in Hardware: Smart Garbage
From ACM Opinion

The Next Big Thing in Hardware: Smart Garbage

There's a box on a shelf in my closet stuffed with smart smoke detectors, old smartphones, chargers, battery cases, fitness trackers, a Kindle that I sat on and...

How to Talk About Blowing Things Up in Cyberspace, According to the Military
From ACM Opinion

How to Talk About Blowing Things Up in Cyberspace, According to the Military

Bombs are relatively simple, when you boil everything down.

The Fasinatng … Frustrating … Fascinating History of Autocorrect
From ACM Opinion

The Fasinatng … Frustrating … Fascinating History of Autocorrect

Invoke the word autocorrect and most people will think immediately of its hiccups—the sort of hysterical, impossible errors one finds collected on sites like Damn...

Slow Search
From Communications of the ACM

Slow Search

Seeking to enrich the search experience by allowing for extra time and alternate resources.

Researching the Robot Revolution
From Communications of the ACM

Researching the Robot Revolution

Considering a program for cross-disciplinary research between computer scientists and economists studying the effects of computers on work.

From Communications of the ACM

Forked Over

Shortchanged by open source.

Private Then Shared?
From Communications of the ACM

Private Then Shared?

Designing for the mobile phone to shared PC pipeline.

Fostering Computational Literacy in Science Classrooms
From Communications of the ACM

Fostering Computational Literacy in Science Classrooms

An agent-based approach to integrating computing in secondary-school science courses.

Can You Engineer Privacy?
From Communications of the ACM

Can You Engineer Privacy?

The challenges and potential approaches to applying privacy research in engineering practice.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account