acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

From ACM Opinion

Internet Scientist Says, You Can't Hack Data From Militaries. Then Who Did and How?

An acclaimed Internet scientist in China has said that there is no way hackers could access top-secret data by penetrating the firewalls of military or government...

Is China's 'secure' Os a Threat to ­.s Offensive Cyber Capabilities?
From ACM Opinion

Is China's 'secure' Os a Threat to ­.s Offensive Cyber Capabilities?

China's development of the Kylin hardened operating system undermines U.S. offensive cyber warfare capabilities, Kevin G. Coleman of Technolytics Institute told...

Inventor: Ssl Not to Blame For Security Woes
From ACM TechNews

Inventor: Ssl Not to Blame For Security Woes

It is unfair to blame Secure Sockets Layer (SSL) for security woes because system weaknesses are usually attributed to the browser, while SSL is simply a protocol...

The Downside of Friends: Facebook's Hacking Problem
From ACM Opinion

The Downside of Friends: Facebook's Hacking Problem

Scammers unleashed a new attack on Facebook last week, collecting users' log-in information and passwords and pilfering victims' "friends" lists to target the next...

The Rise, Fall, and Resurrection of Software as a Service
From Communications of the ACM

The Rise, Fall, and Resurrection of Software as a Service

The commercial opportunities of software as a service are widely hyped these days and many think SaaS is the future of software. That might be true in the medium...

The Network Neutrality Debate Hits Europe
From Communications of the ACM

The Network Neutrality Debate Hits Europe

Differences in telecommunications regulation between the U.S. and the European Union are a key factor in viewing the debate over network neutrality legislation...

Vint Cerf on Ipv6's Future, the Net's Redesign, and Google's Power
From ACM News

Vint Cerf on Ipv6's Future, the Net's Redesign, and Google's Power

ACM Fellow and A.M. Turing Award winner Vinton G. Cerf discusses a range of issues including broader Internet availability and his work with universities as Chief...

Q&A: Our Dame Commander
From Communications of the ACM

Q&A: Our Dame Commander

Wendy Hall discusses her plans to increase ACM's membership and to create task forces in China, India, and Europe.

Computing as Social Science
From Communications of the ACM

Computing as Social Science

College students must be shown that computer science is social, relevant, important, and caring. The way computer science is taught can hold students' interest...

The Grill: Jeannette M. Wing on the Hot Seat
From ACM TechNews

The Grill: Jeannette M. Wing on the Hot Seat

Carnegie Mellon University professor Jeannette M. Wing is an expert on computational thinking, the discipline of applying computer science's problem-solving methods...

Advising Students For Success
From Communications of the ACM

Advising Students For Success

Some advice for those doing the advising (and what the advisors can learn from the advisees).

Your Students Are Your Legacy
From Communications of the ACM

Your Students Are Your Legacy

This Viewpoint boils down into a few magazine pages what I've learned in my 32 years of mentoring Ph.D. students.

When Is a 'License' Really a Sale?
From Communications of the ACM

When Is a 'License' Really a Sale?

Can you resell software even if the package says you can't? What are the implications for copyright law of the U.S. Supreme Court's unanimous June 2008 decision...

Is Software Engineering Engineering?
From Communications of the ACM

Is Software Engineering Engineering?

Software engineering continues to be dogged by claims it is not engineering. Adopting a computer-systems view that embraces hardware, software, and user environment...

Point/Counterpoint: Network Neutrality Nuances
From Communications of the ACM

Point/Counterpoint: Network Neutrality Nuances

A discussion of divergent paths to unrestricted access of content and applications via the Internet.

From Communications of the ACM

Inside Risks: U.S. Election After-Math

Recounting problems still associated with election integrity, transparency, and accountability.

International Communications Tapped For Intelligence-Gathering
From Communications of the ACM

International Communications Tapped For Intelligence-Gathering

Governments concerned with national-security threats use the Internet to gather intelligence from communications traffic that transits local facilities. This surveillance...

Human Computing Skills: Rethinking the K-12 Experience
From Communications of the ACM

Human Computing Skills: Rethinking the K-12 Experience

Establishing the fundamentals of computational thinking is essential to improving computer science education.

Economic and Business Dimensions: The Extent of Globalization of Software Innovation
From Communications of the ACM

Economic and Business Dimensions: The Extent of Globalization of Software Innovation

Will the software development laboratories follow the production mills?

The Dot-Org Difference
From Communications of the ACM

The Dot-Org Difference

One of the first things you'll notice about the new Communications Web site (cacm.acm.org) is that it has different...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account