Sign In

Communications of the ACM

Recent Opinion



The Coming African Tsunami of Information Insecurity
From Communications of the ACM

The Coming African Tsunami of Information Insecurity

As the affordability and use of mobile phones in Africa increase, so too will security vulnerabilities.

Could Terrorists Launch America's Nuclear Missiles?
From ACM Opinion

Could Terrorists Launch America's Nuclear Missiles?

The Air Force calls the situation "Launch Facilities Down." On Oct. 23, a Wyoming-based squadron of 50 nuclear-tipped intercontinental ballistic missiles (ICBMs)—enough...

The Speed Camera that Doesn't Just Check Your Speed
From ACM News

The Speed Camera that Doesn't Just Check Your Speed

Everyone knows that speed cameras work. They create the discipline of a lissom lady in leather and make sure everyone understands just what the rules are. In fact...

The Day the Internet Threw a Righteous Hissyfit About Copyright And Pie
From ACM Opinion

The Day the Internet Threw a Righteous Hissyfit About Copyright And Pie

So you might have heard a story yesterday about a little magazine called Cooks Source. Up until then, you might never have heard of Cooks Source. But maybe you've...

Is China a Supercomputer Threat? (Q&A)
From ACM Opinion

Is China a Supercomputer Threat? (Q&A)

With China expected to officially take the supercomputer performance crown next month, I asked an expert about the state of supercomputing in the U.S. and whether...

Is China a Supercomputer Threat? (Q&A)
From ACM Opinion

Is China a Supercomputer Threat? (Q&A)

With China expected to officially take the supercomputer performance crown next month, I asked an expert about the state of supercomputing in the U.S. and whether...

Google Is Polluting the Internet
From ACM Opinion

Google Is Polluting the Internet

The danger of allowing an advertising company to control the index of human knowledge is too obvious to ignore.

From ACM Opinion

Declare War on Wikileaks

The Pentagon looks defenseless against cyberwarfare.

From Communications of the ACM

In Support of Computer Science Teachers and the CSTA

If we want more computer science students, and if we want computer scientists to be understood for what we are, we must clarify the message about computer science...

Sensor Networks For the Sciences
From Communications of the ACM

Sensor Networks For the Sciences

Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.

Why Isn't Cyberspace More Secure?
From Communications of the ACM

Why Isn't Cyberspace More Secure?

Evaluating governmental actions—and inactions—toward improving cyber security and addressing future challenges.

Why Do Software Startups Patent (or Not)?
From Communications of the ACM

Why Do Software Startups Patent (or Not)?

Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.

K–12 Computational Learning
From Communications of the ACM

K–12 Computational Learning

Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.

Cybersecurity as a Catalyst For Economic Growth
From ACM TechNews

Cybersecurity as a Catalyst For Economic Growth

Patrick Gorman, former associate director of the U.S. Office of the Director of National Intelligence, says the United States should apply the lessons of the space...

Don't Stick It In: The Dangers of ­sb Drives
From ACM Opinion

Don't Stick It In: The Dangers of ­sb Drives

Talking to a computer security researcher about Stuxnet is like asking an art critic to describe the finer points of the Mona Lisa. The world's top cybersecurity...

From ACM Opinion

If We Aren't Ready For Cyberwar, We Will Lose the Next War

In an increasingly digital world, ironically, there may yet be a silver lining to the primitive nature of India's infrastructure: that it is not computer-controlled...

Score: Agile Research Group Management
From Communications of the ACM

Score: Agile Research Group Management

Adapting agile software development methodology toward more efficient management of academic research groups.

Version Aversion
From Communications of the ACM

Version Aversion

The way you number your releases communicates more than you might think.

Risks of ­Undisciplined Development
From Communications of the ACM

Risks of ­Undisciplined Development

An illustration of the problems caused by a lack of discipline in software development and our failure to apply what is known in the field.

Victorian Data Processing
From Communications of the ACM

Victorian Data Processing

The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account