acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

William Gibson Says the Future Is Right Here, Right Now
From ACM Opinion

William Gibson Says the Future Is Right Here, Right Now

"In the 1960s I think that in some sense the present was actually about three or four years long," he said, "because in three or four years relatively little...

From ACM Opinion

Why Telecom Regulation Needs to Change

Research suggests that the approach that worked with a few large companies with aligned interests needs revisiting in the Internet age.

Don't Stick It In: The Dangers of ­sb Drives
From ACM Opinion

Don't Stick It In: The Dangers of ­sb Drives

Talking to a computer security researcher about Stuxnet is like asking an art critic to describe the finer points of the Mona Lisa. The world's top cybersecurity...

Sorkin vs. Zuckerberg
From ACM Opinion

Sorkin vs. Zuckerberg

"The Social Network" is wonderful entertainment, but its message is actually kind of evil.

Score: Agile Research Group Management
From Communications of the ACM

Score: Agile Research Group Management

Adapting agile software development methodology toward more efficient management of academic research groups.

Version Aversion
From Communications of the ACM

Version Aversion

The way you number your releases communicates more than you might think.

Platforms and Services: Understanding the Resurgence of Apple
From Communications of the ACM

Platforms and Services: Understanding the Resurgence of Apple

Combining new consumer devices and Internet platforms with online services and content is proving to be a successful strategy.

Victorian Data Processing
From Communications of the ACM

Victorian Data Processing

The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...

From ACM Opinion

Administration Internet-Wiretap Proposals Forget History

Any headline that uses the phrase "wiretap the Internet" is likely to make people on the Internet cranky. When this wiretapping scheme comes from an administration...

From ACM Opinion

Finally, a 21st Century Browser from Microsoft

Like many of us, Microsoft does its best work when it's running scared.

From ACM Opinion

New Business Models Emerge For the Web

I am constantly impressed by the crazy amount of energy entrepreneurs spend hatching innovative services, so I have never understood why they seem to spend so...

From ACM Opinion

Crisis in Computing

It may not be obvious, but if you’ve checked the weather today, ridden in a car or an airplane, made a phone call, or used any number of consumer products, down...

Google's Earth
From ACM Opinion

Google's Earth

"I actually think most people don't want Google to answer their questions," said the search giant's chief executive, Eric Schmidt, in a recent and controversial...

Ban Drone-Porn War Crimes
From ACM Opinion

Ban Drone-Porn War Crimes

Death by joystick is immoral and illegal.

From ACM Opinion

Why Isn't There A Better Way to Text While Driving?

It's deadly. It's irresponsible. And we've all done it. Before you commute home think about this: Why isn't there a better solution to texting while driving.

From ACM Opinion

The Government Can ­se Gps to Track Your Moves

Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This...

From ACM Opinion

Defending a New Domain: The Pentagon

Right now, more than 100 foreign intelligence organizations are trying to hack into the digital networks that undergird U.S. military operations. The Pentagon...

Future Internet Architecture: Clean-Slate Versus Evolutionary Research
From Communications of the ACM

Future Internet Architecture: Clean-Slate Versus Evolutionary Research

Should researchers focus on designing new network architectures or improving the current Internet?

Objects Never? Well, Hardly Ever!
From Communications of the ACM

Objects Never? Well, Hardly Ever!

Revisiting the Great Objects Debate.

Discussing Cyber Attack
From Communications of the ACM

Discussing Cyber Attack

Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account