acm-header
Sign In

Communications of the ACM

Recent Opinion



Your Data Isn't Secure, Don't Trust Companies to Keep It Safe
From ACM Opinion

Your Data Isn't Secure, Don't Trust Companies to Keep It Safe

It's time for a major change in the way our personal, private data is handled. We need to take back our data from companies that are unwilling and unable to protect...

Sohaib Athar on Twitter Fame After Bin Laden Raid (q&a)
From ACM Opinion

Sohaib Athar on Twitter Fame After Bin Laden Raid (q&a)

As U.S. special forces assaulted Osama bin Laden's walled compound in Pakistan, a Twitter user was already recording a rough outline of the events to come.  Sohaib...

Wikileaks Founder Julian Assange Rails Against Facebook, Says It's a Spy Tool For ­.s. Government
From ACM News

Wikileaks Founder Julian Assange Rails Against Facebook, Says It's a Spy Tool For ­.s. Government

WikiLeaks founder Julian Assange called Facebook "the most appalling spying machine ever invented" in an interview with Russia Today, pointing to the popular social...

From ACM Opinion

Sony Hack Highlights Importance of Breach Analysis

Sony's apparent difficulty in figuring out the extent of the damage from the recent intrusion into its PlayStation Network, while frustrating for those affected...

Jobs and Apple Execs on Tracking Down the Facts About Iphones and Location
From ACM Opinion

Jobs and Apple Execs on Tracking Down the Facts About Iphones and Location

Although Apple was silent for several days after researchers raised issues about location information being stored on the iPhone, that wasn’t because it was ignoring...

From ACM Opinion

Will Amazon's Recent Server Failures Slow the Rise of Cloud Computing?

Last Thursday morning around 5 a.m. eastern time, Amazon suffered a major data center outage. These sorts of outages happen now and then, but they seldom makewhy...

From ACM Opinion

Iran's Answer to Stuxnet

Might a "halal Internet" be in the wings?

Your Iphone Is Tracking You. So What.
From ACM Opinion

Your Iphone Is Tracking You. So What.

Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...

Electronic Health Records Face Human Hurdles More Than Technological Ones
From ACM News

Electronic Health Records Face Human Hurdles More Than Technological Ones

In medicine, there's the patient and there's the chart. And the chart is paper.

The Importance of Reviewing the Code
From Communications of the ACM

The Importance of Reviewing the Code

Highlighting the significance of the often overlooked underlying software used to produce research results.

An Interview with Steve Furber
From Communications of the ACM

An Interview with Steve Furber

Steve Furber, designer of the seminal BBC Microcomputer System and the widely used ARM microprocessor, reflects on his career.

Bell Labs and Centralized Innovation
From Communications of the ACM

Bell Labs and Centralized Innovation

In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...

Reaching Learners Beyond Our Hallowed Halls
From Communications of the ACM

Reaching Learners Beyond Our Hallowed Halls

Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.

Online Advertising, Behavioral Targeting, and Privacy
From Communications of the ACM

Online Advertising, Behavioral Targeting, and Privacy

Studying how privacy regulation might impact economic activity on the advertising-supported Internet.

Are You Following a Bot?
From ACM Opinion

Are You Following a Bot?

How to manipulate social movements by hacking Twitter.

The Web's Trust Issues
From ACM Opinion

The Web's Trust Issues

The most dubious phrase in English after "act natural" is "trust me." A party asking for trust without offering a reason why is probably untrustworthy. And yet...

Just How Creepy Is 'creepy'? A Test-Drive
From ACM News

Just How Creepy Is 'creepy'? A Test-Drive

You probably know that some Internet and cell phone applications like Foursquare or Twitter can broadcast your location to the world. And you might know that...

From ACM Opinion

China's War in Cyberspace, August

Strategic theorists frequently lament that military planners are very effective at preparing for the last war, not the next one. Planners today must cope with...

Q&A: The Chief Computer
From Communications of the ACM

Q&A: The Chief Computer

Kelly Gotlieb recalls the early days of computer science in Canada.

Asymmetries and Shortages of the Network Neutrality Principle
From Communications of the ACM

Asymmetries and Shortages of the Network Neutrality Principle

Since the beginning of the debate on network neutrality, and perhaps as an inheritance of that beginning, the controversy has been restricted...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account