acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

The Case For Kill Switches in Military Weaponry
From ACM Opinion

The Case For Kill Switches in Military Weaponry

This summer the insurgent group ISIS captured the Iraqi city of Mosul—and along with it, three army divisions' worth of U.S.-supplied equipment from the Iraqi army...

When Big Data Marketing Becomes Stalking
From ACM Opinion

When Big Data Marketing Becomes Stalking

Many of us now expect our online activities to be recorded and analyzed, but we assume that the physical spaces we inhabit are different.

When Big Data Marketing Becomes Stalking
From ACM Opinion

When Big Data Marketing Becomes Stalking

Many of us now expect our online activities to be recorded and analyzed, but we assume the physical spaces we inhabit are different.

Why We Don't Trust Technology Companies
From ACM Opinion

Why We Don't Trust Technology Companies

Last October, T-Mobile made an astonishing announcement: from now on, when you travel internationally with a T-Mobile phone, you get free unlimited text messages...

How Microsoft's 1 Percenters Balance Basic Research with Short-Term Success
From ACM Opinion

How Microsoft's 1 Percenters Balance Basic Research with Short-Term Success

When Microsoft launched its research labs in 1991, the personal computer was just beginning to blossom into a worldwide phenomenon, thanks in no small part to Windows...

23andme Is Terrifying, But Not For the Reasons the Fda Thinks
From ACM Opinion

23andme Is Terrifying, But Not For the Reasons the Fda Thinks

If there's a gene for hubris, the 23andMe crew has certainly got it.

How to Manage Your Digital Afterlife
From ACM Opinion

How to Manage Your Digital Afterlife

After their son's suicide, one Wisconsin couple was desperate for answers.

It's Time to Reform the Computer Fraud and Abuse Act
From ACM Opinion

It's Time to Reform the Computer Fraud and Abuse Act

This year the U.S. Congress is considering changes to the Computer Fraud and Abuse Act (CFAA), the primary law that governs cyber crime and fraud on the Internet...

How to Be an Email Survivalist
From ACM Opinion

How to Be an Email Survivalist

In the early 2000s it was the height of geek fashion to run your own email server—then along came Gmail with two gigabytes of free storage and excellent spam filtering...

Dave Farber, Internet's "grandfather," Seeks to Cut Through Fog of Cyberwar
From ACM Opinion

Dave Farber, Internet's "grandfather," Seeks to Cut Through Fog of Cyberwar

Over the last few years, the rhetoric if not the actuality of cyberwarfare has been escalating.

When Will Smartglasses and Other Wearable Computers Hit the Mainstream?
From ACM Opinion

When Will Smartglasses and Other Wearable Computers Hit the Mainstream?

Google has stoked our collective imagination via relentless promotion of its Google Glass wearable computer in recent months.

Is High-Tech Security at Public Events Counterproductive?
From ACM Opinion

Is High-Tech Security at Public Events Counterproductive?

Which is more intrusive: security screening and metal detectors every few blocks, or a drone flying high above it taking video of every little thing you do?

When Will the Internet Reach Its Limit (and How Do We Stop It from Happening)?
From ACM Opinion

When Will the Internet Reach Its Limit (and How Do We Stop It from Happening)?

The number of smartphones, tablets and other network-connected gadgets will outnumber humans by the end of the year.

How Far Away Is Mind-Machine Integration?
From ACM Opinion

How Far Away Is Mind-Machine Integration?

Okay, great: we can control our phones with speech recognition and our television sets with gesture recognition.

How the Icloud Hack Happened and How to Avoid Being Next
From ACM Opinion

How the Icloud Hack Happened and How to Avoid Being Next

Mat Honan, the technology reporter who was digitally disemboweled this past weekend, has revealed exactly how he was so spectacularly owned. His case, a cascade...

From ACM Opinion

The Coming Entanglement: Bill Joy and Danny Hillis

Digital innovators Bill Joy, co-founder of Sun Microsystems, and Danny Hillis, co-founder of the Long Now Foundation, talk with Scientific American Executive Editor...

From ACM Opinion

How Can Malware Be Stopped?

The world of cybersecurity is starting to resemble a paranoid thriller.

Electronic Health Records Face Human Hurdles More Than Technological Ones
From ACM News

Electronic Health Records Face Human Hurdles More Than Technological Ones

In medicine, there's the patient and there's the chart. And the chart is paper.

Does the ­.s. Census Need a 21st-Century Makeover?
From ACM Opinion

Does the ­.s. Census Need a 21st-Century Makeover?

The Internet Age is upon us. But rather than circulating online, the 23rd Decennial Census stuck with the tried-and-true, and flooded the U.S. Postal Service March...

From ACM Opinion

Connecting with an Internet Pioneer, 40 Years Later

Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account