Sign In

Communications of the ACM

Recent Opinion



The Frightening Things You Hear at a Black Hat Conference
From ACM Opinion

The Frightening Things You Hear at a Black Hat Conference

Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.

From ACM Opinion

The Public Is Left in the Dark When Courts Allow Electronic Surveillance

A big part of Magistrate Judge Stephen W. Smith's job in Federal District Court in Houston is to consider law enforcement requests for cellphone and email records...

One Course, 150,000 Students
From ACM TechNews

One Course, 150,000 Students

MIT professor Anant Agarwal recently completed teaching Circuits and Electronics, the first course in MITx, a massive open online learning platform from MIT, which...

The Trouble With Online Education
From ACM Opinion

The Trouble With Online Education

"Ah, you're a professor. You must learn so much from your students."

From ACM Opinion

The End of Privacy?

Cellphones, email, and online social networking have come to rule daily life, but Congress has done nothing to update federal privacy laws to better protect digital...

With Apple
From ACM Opinion

With Apple

Late last summer, I was introduced to a new special someone. I wasn’t looking to meet this new muse; it all just kind of happened.

A Weapon We Can't Control
From ACM Opinion

A Weapon We Can't Control

The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush's presidency...

Free Speech For Computers?
From ACM Opinion

Free Speech For Computers?

Do machines speak? If so, do they have a constitutional right to free speech?

How Depressives Surf the Web
From ACM News

How Depressives Surf the Web

In what way do you spend your time online? Do you check your email compulsively? Watch lots of videos? Switch frequently among multiple Internet applications—from...

Desktop Computers Look More and More Like Smartphones
From ACM Opinion

Desktop Computers Look More and More Like Smartphones

If you're an experienced computer user, you probably remember explaining to newbies how a desktop computer worked: Your photos should go in this folder; your documents...

Apple's Stash of Credit Card Numbers Is Its Secret Weapon
From ACM News

Apple's Stash of Credit Card Numbers Is Its Secret Weapon

That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.

Why Attack When We Can't Defend?
From ACM Opinion

Why Attack When We Can't Defend?

In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...

From ACM Opinion

Facebook's Brilliant Disaster

So I guess you've heard about the recent initial public offering that didn't turn out the way it was supposed to. The company's Wall Street advisers misjudged the...

The Flight From Conversation
From ACM Opinion

The Flight From Conversation

We live in a technological universe in which we are always communicating. And yet we have sacrificed conversation for mere connection.

Following the Breadcrumbs on the Data-Sharing Trail
From ACM Opinion

Following the Breadcrumbs on the Data-Sharing Trail

Would you like to donate to the Obama campaign? Sign up for a college course? Or maybe subscribe to Architectural Digest? 

God and Man in Tennessee
From ACM Opinion

God and Man in Tennessee

Earlier this month state senators in Tennessee approved an update to our sex-education law that would ban teachers from discussing hand-holding, which it categorizes...

Don't Be Evil, but Don't Miss the Train
From ACM Opinion

Don't Be Evil, but Don't Miss the Train

Back in 2004, as Google prepared to go public, Larry Page and Sergey Brin celebrated the maxim that was supposed to define their company: "Don’t be evil."

With New Comforts, Growing Complacent
From ACM Careers

With New Comforts, Growing Complacent

Google and Facebook, young and successful companies that they are, risk being left behind as technology shifts from PCs and Web browsers to mobile devices.

From ACM Opinion

From the Birthplace of Big Brother

The George W. Bush team must be consumed with envy. Britain's government is preparing sweeping new legislation that would let the country's domestic intelligence...

How China Steals Our Secrets
From ACM Opinion

How China Steals Our Secrets

For the last two months, senior government officials and private-sector experts have paraded before Congress and described in alarming terms a silent threat: cyberattacks...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account