Sign In

Communications of the ACM

Recent Articles


Articles Interviews Vardi's Insights Opinion Archive Refine your search:
subjectComputer Applications
authorThe Atlantic

The Cathedral of Computation
From ACM Opinion

The Cathedral of Computation

Algorithms are everywhere, supposedly.

The Adultery Arms Race
From ACM Opinion

The Adultery Arms Race

Jay's wife, Ann, was supposed to be out of town on business.

When Everything Works Like Your Cell Phone
From ACM Opinion

When Everything Works Like Your Cell Phone

Everyone understands what it means to own a plunger.

The Internet Is Losing Interest in Computers
From ACM Opinion

The Internet Is Losing Interest in Computers

You may know Google Trends.

Want to Reform the Nsa? Give Edward Snowden Immunity
From ACM Opinion

Want to Reform the Nsa? Give Edward Snowden Immunity

In 1970, Christopher Pyle disclosed in public writing that the U.S. Army was running a domestic intelligence program aimed at anti-war and civil-rights activists...

The Coming Age of the Internet Naturalist
From ACM Careers

The Coming Age of the Internet Naturalist

Three years ago, Shaun Winterton was looking at photos of bugs on Flickr.

The New Editors of the Internet
From ACM Opinion

The New Editors of the Internet

Bowing to their better civic natures, and the pleas of James Foley's family, Twitter and YouTube have pulled down videos and photos of his murder.

Email Is Still the Best Thing on the Internet
From ACM Opinion

Email Is Still the Best Thing on the Internet

All these people are trying to kill email.

A Tool That Answers 'what's That Typeface?'
From ACM Opinion

A Tool That Answers 'what's That Typeface?'

The Internet is, from its very core to its most distant peripheries, a vast universe of text.

How to Invent a Person Online
From ACM Opinion

How to Invent a Person Online

On April 8, 2013, I received an envelope in the mail from a nonexistent return address in Toledo, Ohio.

I Sent All My Text Messages in Calligraphy For a Week
From ACM Opinion

I Sent All My Text Messages in Calligraphy For a Week

I got my first mobile phone when I was in high school. It was 2005, and the feeling of "cool" overwhelmed me.

The Beautiful, Invisible Game
From ACM Opinion

The Beautiful, Invisible Game

The first goal of the 2014 World Cup was Brazilian, and it was an own goal.

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?
From ACM Opinion

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?

There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose...

The Not-So-Distant Future When We Can All ­pgrade Our Brains
From ACM Opinion

The Not-So-Distant Future When We Can All ­pgrade Our Brains

In a decade, cognitive enhancement may have gone mainstream.

Computer Mice: Still a Thing
From ACM Opinion

Computer Mice: Still a Thing

For decades, the mouse was a key component of how one interacted with a computer.

If the Robots Kill ­s, It's Because It's Their Job
From ACM Opinion

If the Robots Kill ­s, It's Because It's Their Job

In the movie Transcendence, which opens in theaters on Friday, a sentient computer program embarks on a relentless quest for power, nearly destroying humanity in...

Captchas Are Becoming Security Theater
From ACM Opinion

Captchas Are Becoming Security Theater

CAPTCHAs are a time-worn way for humans to tell computers that we are human.

Google Wants to Make 'science Fiction' a Reality—and That's Limiting Their Imagination
From ACM Opinion

Google Wants to Make 'science Fiction' a Reality—and That's Limiting Their Imagination

Self-driving cars, extreme life extension, and global wifi provided by weather balloons: Google makes projects that sound like science fiction into reality at its...

The Dream of Intelligent Robot Friends
From ACM Opinion

The Dream of Intelligent Robot Friends

Karotz is an Internet-enabled console in the shape of an abstracted rabbit.

There's No Real Difference Between Online Espionage and Online Attack
From ACM Opinion

There's No Real Difference Between Online Espionage and Online Attack

Back when we first started getting reports of the Chinese breaking into U.S. computer networks for espionage purposes, we described it in some very strong language...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account