Sign In

Communications of the ACM

Recent Opinion



Five Things that Could Topple Facebook's Empire
From ACM Opinion

Five Things that Could Topple Facebook's Empire

Facebook is primed to announce this week that it's amassed a half billion active friends, a milestone reinforcing its status as the king of social networks—a company...

Search Top Secret America's Database of Private Spooks
From ACM Opinion

Search Top Secret America's Database of Private Spooks

Figuring out exactly who's cashing in on the post-9/11 boom in secret programs just got a whole lot easier.

Threat of 'cyberwar' Has Been Hugely Hyped
From ACM Opinion

Threat of 'cyberwar' Has Been Hugely Hyped

There's a power struggle going on in the U.S. government right now. It's about who is in charge of cyber security, and how much control the government will exert...

From ACM Opinion

Wikileaks Fails "due Diligence" Review

In the past week, both the Washington Post and the New York Times have referred to WikiLeaks.org, the web site that publishes confidential records, as a "whistleblower"...

Advice to Members Seeking ACM Distinction
From Communications of the ACM

Advice to Members Seeking ACM Distinction

ACM's Distinguished Member Recognition Program recognizes members in three categories: Educator, Engineer, and Scientist. Each category...

Cultivating Cultural Diversity in Information Technology
From Communications of the ACM

Cultivating Cultural Diversity in Information Technology

Introducing CMD-IT, a new center focused on synergistic activities related to ethnic minorities and people with disabilities.

Should the Google Book Settlement Be Approved?
From Communications of the ACM

Should the Google Book Settlement Be Approved?

Considering the precedent that could be established by approval of the controversial Google book settlement.

Work Life in the Robotic Age
From Communications of the ACM

Work Life in the Robotic Age

Technological change results in changes in expectations, in this case affecting the workplace.

Outsourcing Versus Shared Services
From Communications of the ACM

Outsourcing Versus Shared Services

Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.

Why Minority Report Was Spot On
From ACM Opinion

Why Minority Report Was Spot On

The launch of Microsoft's new Kinect games system, which allows players to run, jump, punch and shoot without having to wear strange clothing or hold any kind of...

From ACM Opinion

Buzz on Lie Detectors Is All a Lie, Nsa Video Says

The National Security Agency wants job applicants to know that its polygraph test is nothing to sweat. The eavesdropping and code-breaking organization has produced...

Virtual Privacy
From ACM TechNews

Virtual Privacy

Northeastern University professor Alan Mislove, whose research focuses on how people interact in the virtual world, says that many patterns of human interaction...

From ACM TechNews

The Cybersecurity Changes We Need

The Obama administration's progress toward the goal of making the U.S. digital infrastructure "secure, trustworthy, and resilient" has been sluggish due to the...

Institutional Review Boards and Your Research
From Communications of the ACM

Institutional Review Boards and Your Research

Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...

Intel's Rebates: Above Board or Below the Belt?
From Communications of the ACM

Intel's Rebates: Above Board or Below the Belt?

Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...

Plotting Away
From Communications of the ACM

Plotting Away

Dear KV, I've been working with some code that generates massive data sets, and . . . I'm finding that more and more often I...

The Resurgence of Parallelism
From Communications of the ACM

The Resurgence of Parallelism

Parallel computation is making a comeback after a quarter century of neglect. Past research can be put to quick use today.

Privacy By Design: Moving From Art to Practice
From Communications of the ACM

Privacy By Design: Moving From Art to Practice

Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...

Myths and Fallacies of 'Personally Identifiable Information'
From Communications of the ACM

Myths and Fallacies of 'Personally Identifiable Information'

Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...

From Facebook, Answering Privacy Concerns with New Settings
From ACM Opinion

From Facebook, Answering Privacy Concerns with New Settings

Six years ago, we built Facebook around a few simple ideas. People want to share and stay connected with their friends and the people around them. If we give people...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account