Sign In

Communications of the ACM

Recent Opinion


Articles Interviews Vardi's Insights Opinion Archive Refine your search:
dateMore Than a Year Ago
subjectSoftware
authorTime

With Apple
From ACM Opinion

With Apple

Late last summer, I was introduced to a new special someone. I wasn’t looking to meet this new muse; it all just kind of happened.

A Weapon We Can't Control
From ACM Opinion

A Weapon We Can't Control

The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush's presidency...

Free Speech For Computers?
From ACM Opinion

Free Speech For Computers?

Do machines speak? If so, do they have a constitutional right to free speech?

What, Exactly, Is a Supercomputer?
From ACM Opinion

What, Exactly, Is a Supercomputer?

It's official: The United States is home to the world's fastest supercomputer. But what exactly are supercomputers and why should we care about them? I decidedLawrence...

How Depressives Surf the Web
From ACM News

How Depressives Surf the Web

In what way do you spend your time online? Do you check your email compulsively? Watch lots of videos? Switch frequently among multiple Internet applications—from...

Desktop Computers Look More and More Like Smartphones
From ACM Opinion

Desktop Computers Look More and More Like Smartphones

If you're an experienced computer user, you probably remember explaining to newbies how a desktop computer worked: Your photos should go in this folder; your documents...

Apple's Stash of Credit Card Numbers Is Its Secret Weapon
From ACM News

Apple's Stash of Credit Card Numbers Is Its Secret Weapon

That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.

From ACM Opinion

Drones, Computer Viruses, and Blowback

Another day, another senior al-Qaeda leader killed by a drone strike. (I can't be the first to point out that being al-Qaeda's No. 2 is like being the drummer for...

Why Attack When We Can't Defend?
From ACM Opinion

Why Attack When We Can't Defend?

In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...

The Flight From Conversation
From ACM Opinion

The Flight From Conversation

We live in a technological universe in which we are always communicating. And yet we have sacrificed conversation for mere connection.

Following the Breadcrumbs on the Data-Sharing Trail
From ACM Opinion

Following the Breadcrumbs on the Data-Sharing Trail

Would you like to donate to the Obama campaign? Sign up for a college course? Or maybe subscribe to Architectural Digest? 

How China Steals Our Secrets
From ACM Opinion

How China Steals Our Secrets

For the last two months, senior government officials and private-sector experts have paraded before Congress and described in alarming terms a silent threat: cyberattacks...

Tv Makers Ignore Apps at Their Own Peril
From ACM Opinion

Tv Makers Ignore Apps at Their Own Peril

Every night, I get home from work, drop onto the couch and sit there surfing the Web or watching videos on my 3 1/2-inch iPhone screen. My big-screen HDTV sits...

The Connected Human: How the World Is About to Get Even Smaller
From ACM Opinion

The Connected Human: How the World Is About to Get Even Smaller

It may be difficult to imagine a world where human beings are even more connected than we are now.  

From ACM Opinion

Apple's Mountain Lion Makes the Mac More Like the Ipad

Apple's iPhones and iPads get most of the attention, but Apple is now directing the spotlight on the Mac.

A High-Tech War on Leaks
From ACM Opinion

A High-Tech War on Leaks

Back in 2006, before the Obama administration made leak prosecutions routine, a panel of three federal appeals court judges in New York struggled to decide whether...

Erasing the Boundaries
From ACM Opinion

Erasing the Boundaries

Technology used to be so simple.

Beyond Sopa
From ACM Opinion

Beyond Sopa

We welcomed the collapse this month of two flawed bills to prevent online piracy, bills that could have stifled speech and undermined Internet safety. But piracy...

Building the Team That Built Watson
From ACM Opinion

Building the Team That Built Watson

The assignment was one of the biggest challenges in the field of artificial intelligence: build a computer smart enough to beat grand champions at the game of...

Four Industries Apple Can Disrupt in the Near Future
From ACM Opinion

Four Industries Apple Can Disrupt in the Near Future

Over the past 10 years, Apple has done a rather amazing job of disrupting quite a few industries.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account