Sign In

Communications of the ACM

Recent Articles



Where Are All the Working Mothers in STEM?
From ACM Opinion

Where Are All the Working Mothers in STEM?

Parenthood is a key driver of gender imbalance in STEM. Almost half of all women in full-time science jobs leave or go part-time after the birth of their first...

Facebook's Calibra Is A Secret Weapon for Monetizing Its New Cryptocurrency
From ACM Opinion

Facebook's Calibra Is A Secret Weapon for Monetizing Its New Cryptocurrency

Facebook's announcement of a new cryptocurrency, Libra, and the nonprofit association that will oversee it raises questions about the future of global banking and...

Love It or Hate It, Java Continues to Evolve
From ACM Opinion

Love It or Hate It, Java Continues to Evolve

A recent article about languages that developers love and those that they hate reported that Java was the third most loved language as well as the second most hated...

Software Below the Poverty Line
From ACM Opinion

Software Below the Poverty Line

The majority of open-source projects that we usually consider sustainable are actually receiving income below industry standards or even below the poverty threshold...

Personal Data and the Internet of Things
From Communications of the ACM

Personal Data and the Internet of Things

It is time to care about digital provenance.

An Interview with David Brin on Resiliency
From Communications of the ACM

An Interview with David Brin on Resiliency

Many risks of catastrophic failures of critical infrastructures can be significantly reduced by relatively simple measures to increase resiliency.

Through Computer Architecture, Darkly
From Communications of the ACM

Through Computer Architecture, Darkly

Total-system hardware and microarchitectural issues are becoming increasingly critical.

Global Data Justice
From Communications of the ACM

Global Data Justice

A new research challenge for computer science.

Continuity and Change in Internet Law
From Communications of the ACM

Continuity and Change in Internet Law

The fundamentals of the field of Internet law have remained consistent, but details have evolved in response to technological innovation.

Encryption and Surveillance
From Communications of the ACM

Encryption and Surveillance

Why the law-enforcement access question will not just go away.

What Does It Mean for a Computing Curriculum to Succeed?
From Communications of the ACM

What Does It Mean for a Computing Curriculum to Succeed?

Examining the expansion, proliferation, and integration of computing education everywhere.

Enterprise Wi-Fi
From Communications of the ACM

Enterprise Wi-Fi: We Need Devices That Are Secure by Default

Seeking to increase awareness of WPA2 Enterprise network security technology flaws and reduce risk to users.

As Governments Adopt Artificial Intelligence, There's Little Oversight and Lots of Danger
From ACM Opinion

As Governments Adopt Artificial Intelligence, There's Little Oversight and Lots of Danger

Artificial intelligence systems can—if properly used—help make government more effective and responsive, improving the lives of citizens. Improperly used, however...

The FBI Wanted a Backdoor to the iPhone. Tim Cook Said No
From ACM Opinion

The FBI Wanted a Backdoor to the iPhone. Tim Cook Said No

In 2016, Tim Cook fought the law—and won.

The ­U.S. Is Losing a Major Front to China in the New Cold War
From ACM Opinion

The ­U.S. Is Losing a Major Front to China in the New Cold War

A swathe of the world is adopting China's vision for a tightly controlled internet over the unfettered American approach, a stunning ideological coup for Beijing...

Is Julian Assange a Journalist, or Is He Just an Accused Thief?
From ACM Opinion

Is Julian Assange a Journalist, or Is He Just an Accused Thief?

Is Julian Assange a journalist? The Justice Department sidestepped that question in its indictment of Assange.

The ­.S. Campaign Against Huawei Can Offer No ­.S.-Based Alternatives
From ACM Opinion

The ­.S. Campaign Against Huawei Can Offer No ­.S.-Based Alternatives

As U.S. officials have pressured allies not to use networking gear from Chinese technology giant Huawei over spying concerns, President Trump has urged American...

­Untold History of AI: The DARPA Dreamer Who Aimed for Cyborg Intelligence
From ACM Opinion

­Untold History of AI: The DARPA Dreamer Who Aimed for Cyborg Intelligence

At 10:30pm on 29 October 1969, a graduate student at UCLA sent a two-letter message from an SDS Sigma 7 computer to another machine a few hundred miles away at...

The Robocall Crisis Will Never Be Totally Fixed
From ACM Opinion

The Robocall Crisis Will Never Be Totally Fixed

Years into the robocalling frenzy, your phone probably still rings off the hook with "important information about your account," updates from the "Chinese embassy...

­U.S. Allies Should Heed the Warnings about Huawei
From ACM Opinion

­U.S. Allies Should Heed the Warnings about Huawei

In a recent newspaper advertisement, the Chinese telecommunications giant Huawei appealed to common sense.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account