Sign In

Communications of the ACM

Articles


Recent Articles


Why Save a Computer Virus?
From ACM Opinion

Why Save a Computer Virus?

On average, 82,000 new malware threats are created each day.

Presidential Campaigns Are Talking Around The Robot In The Room
From ACM Opinion

Presidential Campaigns Are Talking Around The Robot In The Room

While U.S. presidential candidates are talking about tax rates, tax breaks, and trade — they are ignoring an economic issue that soon may matter far more to working...

Can We Trust Julian Assange and WikiLeaks?
From ACM Opinion

Can We Trust Julian Assange and WikiLeaks?

The release of a cache of emails from the Democratic National Committee by WikiLeaks last month has raised a great many questions—about the role of the D.N.C. in...

After Fatality, Autonomous Car Development May Speed Up
From ACM Opinion

After Fatality, Autonomous Car Development May Speed Up

The world has witnessed enormous advances in autonomous passenger vehicle technologies over the last dozen years.

Take Responsibility for Electronic-Waste Disposal
From ACM Opinion

Take Responsibility for Electronic-Waste Disposal

The world is producing ever more electrical and electronic waste.

Remembering a Thinker Who Thought About Thinking
From ACM Opinion

Remembering a Thinker Who Thought About Thinking

The field of educational technology is mourning a visionary whose work was considered 50 years ahead of its time.

The World's Best Cyber Army Doesn't Belong to Russia
From ACM Opinion

The World's Best Cyber Army Doesn't Belong to Russia

National attention is focused on Russian eavesdroppers' possible targeting of U.S. presidential candidates and the Democratic Congressional Campaign Committee.

The Lessons of the DNC Hack
From ACM Opinion

The Lessons of the DNC Hack

Just days after Robert Gates became secretary of defense in December 2006, in the middle of George W. Bush’s second term, he found himself so stunned by the volume...

Make Algorithms Accountable
From ACM Opinion

Make Algorithms Accountable

Algorithms are ubiquitous in our lives.

The Doom of Your Memories Doesn't Really Exist
From ACM Opinion

The Doom of Your Memories Doesn't Really Exist

If you played Doom during its heyday in the 90s, I have some disappointing news: it's not as frightening as you remember.

How Copyright Law Stifles Your Right to Tinker with Tech
From ACM Opinion

How Copyright Law Stifles Your Right to Tinker with Tech

The CEO of the gadget-repair site iFixit explains why tech groups are suing the U.S. government over the Digital Millennium Copyright Act.

WikiLeaks Has Officially Lost the Moral High Ground
From ACM Opinion

WikiLeaks Has Officially Lost the Moral High Ground

What the heck is going on at WikiLeaks?

Dark Patterns Are Designed to Trick You (and They're All Over the Web)
From ACM Opinion

Dark Patterns Are Designed to Trick You (and They're All Over the Web)

It happens to the best of us. After looking closely at a bank statement or cable bill, suddenly a small, unrecognizable charge appears.

The Science That Fed Frankenstein
From ACM Opinion

The Science That Fed Frankenstein

In 1816, a teenager began to compose what many view as the first true work of science fiction—and unleashed one of the most subversive attacks on modern science...

Could Brain Training Prevent Dementia?
From ACM Opinion

Could Brain Training Prevent Dementia?

It's been a lousy couple of years for researchers who study the effects of computerized brain training.

Americans Are Wary About Body-Enhancement Technologies
From ACM Opinion

Americans Are Wary About Body-Enhancement Technologies

Emerging technologies that draw from biomedical technology, nanotechnology, information technology and other fields are developing at a rapid pace and may lead...

Teamwork in Computing Research
From Communications of the ACM

Teamwork in Computing Research

Considering the benefits and downsides of collaborative research.

Chilling the Messenger
From Communications of the ACM

Chilling the Messenger

Keeping ego out of software-design review.

From Computational Thinking to Computational Participation in K-12 Education
From Communications of the ACM

From Computational Thinking to Computational Participation in K-12 Education

Seeking to reframe computational thinking as computational participation.

Computer Security Is Broken
From Communications of the ACM

Computer Security Is Broken: Can Better Hardware Help Fix It?

Computer security problems have far exceeded the limits of the human brain. What can we do about it?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo