acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

From ACM Opinion

Post-9/11, Nsa 'enemies' Include ­s

Somewhere between Sept. 11 and today, the enemy morphed from a handful of terrorists to the American population at large, leaving us nowhere to run and no place...

From ACM Opinion

A Cloud Over Ownership

Online services set content free from the physical world's constraints—including those that have defined the very idea of possession.

The Calm Before the Storm
From ACM Opinion

The Calm Before the Storm

Revelations of wholesale electronic fraud and massive data heists have become weekly, even daily affairs.

From ACM News

Cryptocurrency

The bitcoin, a virtual medium of exchange, could be a real alternative to government-issued money—but only if it survives hoarding by speculators.

From ACM Opinion

Eff to Court: Don't Let Government Hide Illegal Surveillance

The Electronic Frontier Foundation urged the 9th U.S. Circuit Court of Appeals yesterday to preserve lawsuits challenging the government's illegal mass surveillance...

Technology Is Our Friend... Except When It Isn't
From ACM Opinion

Technology Is Our Friend... Except When It Isn't

The technology in question starts with "gigapixel" photography. Gigapixel photos are giant panoramas that themselves consist of hundreds of component mega-pixel...

From ACM Opinion

How to Fix Our Math Education

There is widespread alarm in the United States about the state of our math education. The anxiety can be traced to the poor performance of American students on...

From ACM Opinion

Beware: Europe's 'unitary Patent' Could Mean ­nlimited Software Patents

Just as the U.S. software industry is experiencing the long-anticipated all-out software patent wars, the European Union has a plan to follow the same course....

From ACM Opinion

Apple Will Do Amazingly Well Without Steve Jobs

On Thursday morning, shares of Apple are going to plummet. As a journalist who covers the company, I'm ethically restricted from investing. But you're not, and...

Judge Says Warrant Required For Cell Phone Location Data
From ACM News

Judge Says Warrant Required For Cell Phone Location Data

In recent years, the courts have struggled to decide whether the government needs a warrant to access historical records about a cell phone user's location. Some...

Arrogance in Business Planning
From Communications of the ACM

Arrogance in Business Planning

Technology business plans that assume no competition — ever.

Realizing the Value of Social Media Requires Innovative Computing Research
From Communications of the ACM

Realizing the Value of Social Media Requires Innovative Computing Research

How social media are expanding traditional research and development topics for computer and information scientists.

Managing Time, Part 2
From Communications of the ACM

Managing Time, Part 2

Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.

Corporate Social Responsibility and Global IT Outsourcing
From Communications of the ACM

Corporate Social Responsibility and Global IT Outsourcing

How to improve IT outsourcing relationships while doing good for society.

In Praise of 'Wilkes, Wheeler, and Gill'
From Communications of the ACM

In Praise of 'Wilkes, Wheeler, and Gill'

Sixty years ago, Maurice Wilkes, David Wheeler, and Stanley Gill produced the first textbook on programming: The Preparation of Programs for an Electronic Digital...

Remix Nation
From Communications of the ACM

Remix Nation

Assessing the threat the anticircumvention provisions of the Digital Millennium Copyright Act pose for fair use.

Steve, Please Buy ­S a Carrier!
From ACM Opinion

Steve, Please Buy ­S a Carrier!

What should Apple do with its $76bn in cash? It could do worse than spend some of it on acquiring its own mobile carrier.

Why Cctv Has Failed to Deter Criminals
From ACM Opinion

Why Cctv Has Failed to Deter Criminals

I've lost track of the number of people who've asked me to comment on David Cameron's insane plan to cripple Britain's Internet in times of civil unrest by blocking...

From ACM Opinion

What Constitutes an Act of Cyberwar?

Before we get to that, there's a clue in the spelling of the word: cyberwar instead of cyber war. The U.S. Defense Department has determined that cyber is a fifth...

From ACM News

Shady Rat Hacking Is Not About China

Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account