acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Epic Mickey Creator Wants to 'shame' Doom and ­nreal Makers: Why He's Not Wrong
From ACM Opinion

Epic Mickey Creator Wants to 'shame' Doom and ­nreal Makers: Why He's Not Wrong

I never got around to playing Epic Mickey, and that’s a shame, because I’ve played nearly everything else by game design luminary Warren Spector.

Exploring the Planets Enriches ­S at Home
From ACM Opinion

Exploring the Planets Enriches ­S at Home

NASA's newest marvel, a one-ton rover named Curiosity, has been set down with all the delicacy of a carton of eggs on the surface of Mars.

Trust: Ill-Advised in a Digital Age
From ACM Opinion

Trust: Ill-Advised in a Digital Age

Bruce Schneieer ordered a Coke, no ice, at the Rio casino on a Saturday afternoon. I ordered Diet Coke, also no ice, and handed the bartender an American Express...

How Cyber Security Could Be a Winning Issue for Obama
From ACM Opinion

How Cyber Security Could Be a Winning Issue for Obama

A blackout in Manhattan. A major dam failure. Mayhem at a chemical plant. Those are all potential, and entirely plausible, consequences of a cyber attack, according...

Suggestions For an Apple Shopping List
From ACM Opinion

Suggestions For an Apple Shopping List

Question: What would you do if you had $117 billion?

The Frightening Things You Hear at a Black Hat Conference
From ACM Opinion

The Frightening Things You Hear at a Black Hat Conference

Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.

From ACM Opinion

The Public Is Left in the Dark When Courts Allow Electronic Surveillance

A big part of Magistrate Judge Stephen W. Smith's job in Federal District Court in Houston is to consider law enforcement requests for cellphone and email records...

So, Who Really Did Invent the Internet?
From ACM Opinion

So, Who Really Did Invent the Internet?

Gordon Crovitz of the Wall Street Journal's editorial page reopens the ancient debate over who invented the Internet with a column Monday calling out the notion...

The Trouble With Online Education
From ACM Opinion

The Trouble With Online Education

"Ah, you're a professor. You must learn so much from your students."

Can We Fix Computer Science Education in America?
From ACM Opinion

Can We Fix Computer Science Education in America?

The tech sector is set to grow faster than all but five industries by 2020. Out of those fields, half of which are related to healthcare, tech pays the best with...

From ACM Opinion

The End of Privacy?

Cellphones, email, and online social networking have come to rule daily life, but Congress has done nothing to update federal privacy laws to better protect digital...

With Apple
From ACM Opinion

With Apple

Late last summer, I was introduced to a new special someone. I wasn’t looking to meet this new muse; it all just kind of happened.

A Weapon We Can't Control
From ACM Opinion

A Weapon We Can't Control

The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush's presidency...

Free Speech For Computers?
From ACM Opinion

Free Speech For Computers?

Do machines speak? If so, do they have a constitutional right to free speech?

How Depressives Surf the Web
From ACM News

How Depressives Surf the Web

In what way do you spend your time online? Do you check your email compulsively? Watch lots of videos? Switch frequently among multiple Internet applications—from...

Desktop Computers Look More and More Like Smartphones
From ACM Opinion

Desktop Computers Look More and More Like Smartphones

If you're an experienced computer user, you probably remember explaining to newbies how a desktop computer worked: Your photos should go in this folder; your documents...

Apple's Stash of Credit Card Numbers Is Its Secret Weapon
From ACM News

Apple's Stash of Credit Card Numbers Is Its Secret Weapon

That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.

From ACM Opinion

Drones, Computer Viruses, and Blowback

Another day, another senior al-Qaeda leader killed by a drone strike. (I can't be the first to point out that being al-Qaeda's No. 2 is like being the drummer for...

Why Attack When We Can't Defend?
From ACM Opinion

Why Attack When We Can't Defend?

In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...

The Flight From Conversation
From ACM Opinion

The Flight From Conversation

We live in a technological universe in which we are always communicating. And yet we have sacrificed conversation for mere connection.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account