Sign In

Communications of the ACM

Interviews


Recent Interviews


Stroustrup: Why the 35-Year-Old C++ Still Dominates 'Real' Dev
From ACM TechNews

Stroustrup: Why the 35-Year-Old C++ Still Dominates 'Real' Dev

C++ designer Bjarne Stroustrup says the programming language remains vital and relevant 35 years after he first designed it because of its ability to handle complexity...

The Engineer of the Original Apple Mouse Talks About His Remarkable Career
From ACM Opinion

The Engineer of the Original Apple Mouse Talks About His Remarkable Career

Jim Yurchenco was responsible for squeezing the guts inside the impossibly slim Palm V.

Former NSA Deputy Director John C. Inglis
From ACM Opinion

Former NSA Deputy Director John C. Inglis

More than a year after ex-National Security Agency contractor Edward Snowden began leaking details of the agency's electronic surveillance programs, questions remain...

OkCupid's Co-Founder on Experiments, Data Science and the Myth of the 'Unicorn'
From ACM Opinion

OkCupid's Co-Founder on Experiments, Data Science and the Myth of the 'Unicorn'

Christian Rudder, co-founder and president of the IAC/InterActiveCorp.'s OkCupid, caused a stir recently when he responded to Facebook's news feed controversy with...

What It's Like to Fly Passenger Planes from the Ground
From ACM Opinion

What It's Like to Fly Passenger Planes from the Ground

Bob Fraser explains what it feels like to pilot a Jetstream airliner containing passengers on 800-kilometre trips from his desk at BAE Systems in Warton, U.K.

Founder of America's Biggest Hacker Conference: 'We Understand the Threat Now'
From ACM Opinion

Founder of America's Biggest Hacker Conference: 'We Understand the Threat Now'

For one weekend every year, thousands of the world’s best—or worst, depending on your point of view—hackers meet in Las Vegas, Nevada, for Defcon.

Why One of Cybersecurity's Thought Leaders Uses a Pager Instead of a Smart Phone
From ACM Opinion

Why One of Cybersecurity's Thought Leaders Uses a Pager Instead of a Smart Phone

In the computer and network security industry, few people are as well known as Dan Geer.

This Sci-Fi Author Thinks Amazon Will Cause an Apocalypse
From ACM Opinion

This Sci-Fi Author Thinks Amazon Will Cause an Apocalypse

Charles Stross is an award-winning science fiction author whose books include The Bloodline Feud, about timeline-hopping narco-terrorists, Halting State, a near...

Where Tech Is Taking Us: A Conversation With Intel's Genevieve Bell
From ACM Opinion

Where Tech Is Taking Us: A Conversation With Intel's Genevieve Bell

Genevieve Bell grew up among Aboriginal people in Australia, taught anthropology at Stanford and for the past 16 years has worked for Intel.

Why Many Programmers Don't Bother Joining the ACM
From ACM Opinion

Why Many Programmers Don't Bother Joining the ACM

Earlier this month Vint Cerf, co-creator of the TCP/IP protocol and current Google vice president, openly asked professional programmers for feedback regarding...

Three Questions for J. Craig Venter
From ACM Opinion

Three Questions for J. Craig Venter

Genome scientist and entrepreneur J. Craig Venter is best known for being the first person to sequence his own genome, back in 2001.

The NSA's Cyber-King Goes Corporate
From ACM Opinion

The NSA's Cyber-King Goes Corporate

Keith Alexander, the recently retired director of the National Security Agency, left many in Washington slack-jawed when it was reported that he might charge companies...

Three Questions for Robotics Inventor Cynthia Breazeal about Social Robots
From ACM Opinion

Three Questions for Robotics Inventor Cynthia Breazeal about Social Robots

As an academic, Cynthia Breazeal pioneered research into social interaction between humans and robots, developing Kismet, a robot that used facial expressions in...

Take a Virtual Voyage Into Darwin's Library
From ACM Opinion

Take a Virtual Voyage Into Darwin's Library

In his celebrated journey around the world on the HMS Beagle from 1831 to 1836, Charles Darwin collected a plethora of information on the geology, animals, plants...

NSA Implementing Fix to Prevent Snowden-Like Security Breach
From ACM Opinion

NSA Implementing Fix to Prevent Snowden-Like Security Breach

A year after Edward Snowden's digital heist, the NSA's chief technology officer says steps have been taken to stop future incidents. But he says there's no way...

Harnessing the Speed of Light
From ACM Opinion

Harnessing the Speed of Light

The fields of data communication, fabrication, and ultrasound imaging share a common challenge when it comes to improving speed and efficiency: light's diffraction...

Early-Universe Explorer Looks for Answers
From ACM Opinion

Early-Universe Explorer Looks for Answers

On March 17, a panel of four astrophysicists held a press conference at the Harvard-Smithsonian Center for Astrophysics in Cambridge, Mass., to announce that they...

Forget Turing, the Lovelace Test Has a Better Shot at Spotting AI
From ACM Opinion

Forget Turing, the Lovelace Test Has a Better Shot at Spotting AI

When a chatbot called Eugene Goostman passed Alan Turing's famous measure of machine intelligence in June by posing as a Ukrainian teenager with questionable language...

The Hazards of Probing the Internet's Dark Side
From ACM Opinion

The Hazards of Probing the Internet's Dark Side

Late last year, hackers breached Target's data security and stole information from millions of credit cards.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account