Sign In

Communications of the ACM

Recent Opinion



­.s. Enables Chinese Hacking of Google
From ACM Opinion

­.s. Enables Chinese Hacking of Google

Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such as Gmail, in a politically motivated attempt...

From ACM Opinion

Comment: Internet New Shot in the Arm For ­S Hegemony

Over the past 40 years, the US has been dominating the world Internet as the core technique holder with an inherent advantage of being the cradle of the Internet...

Taking Your Network's Temperature
From Communications of the ACM

Taking Your Network's Temperature

A prescription for capturing data to diagnose and debug a networking problem.

Open Access to Scientific Publications
From Communications of the ACM

Open Access to Scientific Publications

In his July 2009 Communications editor's letter "Open, Closed, or Clopen Access?", editor-in-chief Moshe Vardi addressed...

The Need For a National Cybersecurity R&D Agenda
From Communications of the ACM

The Need For a National Cybersecurity R&D Agenda

Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.

Why an Informatics Degree?
From Communications of the ACM

Why an Informatics Degree?

Isn't computer science enough?

Not Seeing the Crime For the Cameras?
From Communications of the ACM

Not Seeing the Crime For the Cameras?

Why it is difficult — but essential — to monitor the effectiveness of security technologies.

From ACM Opinion

A Conversation With Google

Google CEO Eric Schmidt has long defended his company's decision to do business in China despite the restrictions that Beijing imposes on Internet freedom. Nevertheless...

Does Dearth of Info Security Pros Pose Risk?
From ACM TechNews

Does Dearth of Info Security Pros Pose Risk?

Dickie George, the technical director of the U.S. National Security Agency's (NSA's) Information Assurance Directorate, says the shortage of cybersecurity professionals...

Q&A: Researcher Karsten Nohl on Mobile Eavesdropping
From ACM Opinion

Q&A: Researcher Karsten Nohl on Mobile Eavesdropping

Last week brought some bad news for mobile phone users. German security expert Karsten Nohl demonstrated how easy it is to eavesdrop on GSM-based (Global System...

Q&A: Researcher Karsten Nohl on Mobile Eavesdropping
From ACM Opinion

Q&A: Researcher Karsten Nohl on Mobile Eavesdropping

Last week brought some bad news for mobile phone users. German security expert Karsten Nohl demonstrated how easy it is to eavesdrop on GSM-based (Global System...

Is Aviation Security Mostly For Show?
From ACM Opinion

Is Aviation Security Mostly For Show?

Last week's attempted terror attack on an airplane heading from Amsterdam to Detroit has given rise to a bunch of familiar questions. How did the explosives get...

From ACM Opinion

TSA To Save Print Media? No Electronics On International Flights? What A Joke.

With the caveat that the U.S. Transportation Security Administration has yet to confirm any of this on its Web site, there are several indications that orders have...

Q&A: HP's Running Man
From Communications of the ACM

Q&A: HP's Running Man

Prith Banerjee discusses collaborating with universities, his startup experiences, and Hewlett-Packard Lab's approach to research and development.

The Evolution of Platform Thinking
From Communications of the ACM

The Evolution of Platform Thinking

How platform adoption can be an important determinant of product and technological success.

From ACM Opinion

A Cynic

On July 17, 2008, Senator Barack Obama held a town hall meeting on national security at Purdue University. He and his panel covered issues of nuclear, biological...

From ACM Opinion

Connecting with an Internet Pioneer, 40 Years Later

Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...

From ACM Opinion

Connecting with an Internet Pioneer, 40 Years Later

Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...

Broken Builds
From Communications of the ACM

Broken Builds

Frequent broken builds could be symptomatic of deeper problems within a development project.

Computing's Paradigm
From Communications of the ACM

Computing's Paradigm

Trying to categorize computing as engineering, science, or math is fruitless; we have our own paradigm.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account