acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

From ACM News

Protect Your Computer and Phone from Illegal Police Searches

Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your...

Why Lulzsec Had No Choice but to Disband
From ACM Opinion

Why Lulzsec Had No Choice but to Disband

After just 50 days, the group said it was ceasing individual operations. Why, when you might have thought things were going so well?

Applying Graph Analysis and Manipulation to Data Stores
From ACM Opinion

Applying Graph Analysis and Manipulation to Data Stores

Marko Rodriguez and Peter Neubauer, the leaders of the TinkerPop open-source graph software initiative, discuss the project, its members, and its goals.

Applying Graph Analysis and Manipulation to Data Stores
From ACM Opinion

Applying Graph Analysis and Manipulation to Data Stores

Marko Rodriguez and Peter Neubauer, the leaders of the TinkerPop open-source graph software initiative, discuss the project, its members, and its goals.

From ACM Opinion

Supporting Choice, Ensuring Economic Opportunity

At Google, we’ve always focused on putting the user first. We aim to provide relevant answers as quickly as possible—and our product innovation and engineering...

From ACM News

Big Win For the Losers at D-Wave

Does D-Wave's first big sale disprove the quantum computing naysayers?

Values in Design
From Communications of the ACM

Values in Design

Focusing on socio-technical design with values as a critical component in the design process.

Driving Power in Global Supply Chains
From Communications of the ACM

Driving Power in Global Supply Chains

Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...

Seven Questions For Iridium Ceo Matthew Desch
From ACM Opinion

Seven Questions For Iridium Ceo Matthew Desch

More often than not, the Iridium satellite phone system is remembered as one of the great telecom flameouts of the 1990s. It almost became a literal one: At one...

In 'cars 2,' John Lasseter Says Big Oil Is the 'uber Bad Guy'
From ACM Opinion

In 'cars 2,' John Lasseter Says Big Oil Is the 'uber Bad Guy'

"Cars 2" director John Lasseter talked with The Wall Street Journal in his office at the Emeryville headquarters of Pixar Animation Studios, where he is chief...

From ACM Opinion

China's Cyberassault on America

In justifying U.S. involvement in Libya, the Obama administration cited the "responsibility to protect" citizens of other countries when their governments engage...

From ACM News

All Your Bitcoins Are Ours

Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...

Seven Questions For IBM Fellow Bernie Meyerson
From ACM Opinion

Seven Questions For IBM Fellow Bernie Meyerson

There aren’t many technology companies around who can claim to be 100 years old. You're probably hearing that a lot as  media outlets report on the anniversary...

From ACM News

Who Is Behind the Hacks?

Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...

From ACM Opinion

How I Failed, Failed, and Finally Succeeded at Learning How to Code

When Colin Hughes was about 11 years old his parents brought home a rather strange toy. It wasn't colorful or cartoonish; it didn't seem to have any lasers or...

From ACM Opinion

Internet Piracy and How to Stop It

Online piracy is a huge business. A recent study found that Web sites offering pirated digital content or counterfeit goods, like illicit movie downloads or bootleg...

Sony's Kaz Hirai on the Psn Hack
From ACM News

Sony's Kaz Hirai on the Psn Hack

Sony's deputy president about the PlayStation Network hack, PS Vita and PS3's enduring appeal.

Watson's Lead Developer: 'deep Analysis, Speed, and Results'
From ACM News

Watson's Lead Developer: 'deep Analysis, Speed, and Results'

David Ferrucci’s official title is "IBM Fellow and Leader of the Semantic Analysis and Integration Department at IBM's T.J. Watson Research Center." But to the...

Security 'tokens' Take Hit
From ACM News

Security 'tokens' Take Hit

RSA Security is offering to provide security monitoring or replace its well-known SecurID tokens—devices used by millions of corporate workers to securely log...

Feds Versus the Hacker ­nderground: Army of Informers Turned By Fear
From ACM Opinion

Feds Versus the Hacker ­nderground: Army of Informers Turned By Fear

When Jeff Moss, popularly known as the Dark Tangent, started holding underground hacker conferences in Las Vegas he knew he had a problem. All previous gatherings...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account