Sign In

Communications of the ACM

Recent Opinion



The Ethics Beat
From Communications of the ACM

The Ethics Beat

Surveying the increasing variety and nature of ethical challenges encountered by computing researchers and practitioners.

Only Technological Processes Are Patentable
From Communications of the ACM

Only Technological Processes Are Patentable

The U.S. Supreme Court will narrow the universe of process innovations that can be patented to those that are "technological," but what will that mean for software...

Gaming Will Save ­Us All
From Communications of the ACM

Gaming Will Save ­Us All

How gaming, as the first media market to successfully transition toward media-as-a-service, is an exemplar for a similar evolutionary transition of content and...

Google's Diplomatic Alliance with ­.s. Carries Risks
From ACM Opinion

Google's Diplomatic Alliance with ­.s. Carries Risks

Google Inc.'s mastery of Internet search technology is unrivaled, but the high-tech pioneer is in uncharted territory as it finds itself embroiled in U.S. diplomatic...

Gary Reback: Why the Technology Sector Should Care About Google Books
From ACM Opinion

Gary Reback: Why the Technology Sector Should Care About Google Books

This Thursday (February 18) leaders of the international publishing industry will watch with bated breath as a federal judge in New York hears arguments over whether...

From ACM Opinion

I'm Sorry, Dave, I'm Afraid I Can't Make a ­-Turn

When Toyota Prius owners take their cars to the dealer under the company's latest recall, they'll likely be out of the shop in about 30 minutes. Even though the...

From ACM Opinion

Why Google Wants a Faster Internet

There was no lack of, well, buzz about Google's new Buzz social-media platform last week, but more important were a series of moves that suggest the search giant...

From ACM Opinion

Lost in #haiti

If Iran's post-election uprising last summer was the world's first "Twitter revolution," the massive Jan. 12 earthquake in Haiti was the first "Twitter disaster...

From ACM Opinion

How Movies Activate Your Neural G-Spot

Here’s a typical “date night” with me and Hollywood: I don’t know what I want to see. Neither does Hollywood. But it bangs on my eyeballs and eardrums like Stanley...

From ACM Opinion

'don't Be Evil,' Meet 'spy on Everyone': How the Nsa Deal Could Kill Google

The company once known for its "don't be evil" motto is now in bed with the spy agency known for the mass surveillance of American citizens. The National Security...

Steve Jobs and the Economics of Elitism
From ACM Opinion

Steve Jobs and the Economics of Elitism

The more, the better. That’s the fashionable recipe for nurturing new ideas these days. It emphasizes a kind of Internet-era egalitarianism that celebrates the...

From ACM Opinion

What Apple's Ipad Means For Your Wallet


From ACM Opinion

Don't Let Politicians Forget the E Word

Hugh Griffiths is chair of the executive committee of the Campaign for Science & Engineering (CaSE) and chair in intelligent radar systems at University College...

From ACM Opinion

Don't Become a Tool of Hegemony, Google!

President of People's Daily Online He Jiazheng speaks on Internet freedom: The Google-China dispute shows a strategic position change of the United States. In...

­.s. Enables Chinese Hacking of Google
From ACM Opinion

­.s. Enables Chinese Hacking of Google

Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such as Gmail, in a politically motivated attempt...

From ACM Opinion

Comment: Internet New Shot in the Arm For ­S Hegemony

Over the past 40 years, the US has been dominating the world Internet as the core technique holder with an inherent advantage of being the cradle of the Internet...

Open Access to Scientific Publications
From Communications of the ACM

Open Access to Scientific Publications

In his July 2009 Communications editor's letter "Open, Closed, or Clopen Access?", editor-in-chief Moshe Vardi addressed...

The Need For a National Cybersecurity R&D Agenda
From Communications of the ACM

The Need For a National Cybersecurity R&D Agenda

Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.

Why an Informatics Degree?
From Communications of the ACM

Why an Informatics Degree?

Isn't computer science enough?

Not Seeing the Crime For the Cameras?
From Communications of the ACM

Not Seeing the Crime For the Cameras?

Why it is difficult — but essential — to monitor the effectiveness of security technologies.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account