acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Applying Graph Analysis and Manipulation to Data Stores
From ACM Opinion

Applying Graph Analysis and Manipulation to Data Stores

Marko Rodriguez and Peter Neubauer, the leaders of the TinkerPop open-source graph software initiative, discuss the project, its members, and its goals.

From ACM Opinion

Eff and Bitcoin

For several months, EFF has been following the movement around Bitcoin, an electronic payment system that touts itself as "the first decentralized digital currency...

From ACM Opinion

Free to Search and Seize

This spring was a rough season for the Fourth Amendment.

Non-Myths About Programming
From Communications of the ACM

Non-Myths About Programming

Viewing computer science in a broader context to dispel common misperceptions and provide more accurate guidance to students who are...

The Status of Women of Color in Computer Science
From Communications of the ACM

The Status of Women of Color in Computer Science

Addressing the challenges of increasing the number of women of color in computing and ensuring their success.

Too Many Copyrights?
From Communications of the ACM

Too Many Copyrights?

Reinstituting formalities — notice of copyright claims and registration requirements — could help address problems related to too many copyrights that last for...

Values in Design
From Communications of the ACM

Values in Design

Focusing on socio-technical design with values as a critical component in the design process.

Driving Power in Global Supply Chains
From Communications of the ACM

Driving Power in Global Supply Chains

Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...

Networks Are Not Always Revolutionary
From ACM Opinion

Networks Are Not Always Revolutionary

"For most artists," as the famous Tim O'Reilly aphorism has it "the problem isn't piracy, it's obscurity." To me, this is inarguably true and self-evident—the...

From ACM Opinion

China's Cyberassault on America

In justifying U.S. involvement in Libya, the Obama administration cited the "responsibility to protect" citizens of other countries when their governments engage...

From ACM News

All Your Bitcoins Are Ours

Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...

Has Facebook Peaked?
From ACM News

Has Facebook Peaked?

Facebook's active user base grew by only 1.7% in May. That's about half its usual growth rate, and it came after similarly slow growth in April. According to Inside...

From ACM News

Who Is Behind the Hacks?

Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...

From ACM Opinion

Palin Fans Trying to Edit Wikipedia Paul Revere Page

Man, you've gotta almost admire the sheer blind dedication of Sarah Palin's wingnut acolytes.

From ACM Opinion

Weiner's Law

The Web makes it easier than ever to cheat—and easier than ever for cheaters to get caught.

The Danger of E-Books
From ACM Opinion

The Danger of E-Books

In an age where business dominates our governments and writes our laws, every technological advance offers business an opportunity to impose new restrictions...

Internet Architect Vint Cerf to Young People: Science and Tech Careers Can Be Rewarding
From ACM TechNews

Internet Architect Vint Cerf to Young People: Science and Tech Careers Can Be Rewarding

Vint Cerf, one of the Internet's original inventors, notes in an interview that although industry awards are important, they do not receive enough visibility. 

Security 'tokens' Take Hit
From ACM News

Security 'tokens' Take Hit

RSA Security is offering to provide security monitoring or replace its well-known SecurID tokens—devices used by millions of corporate workers to securely log...

Feds Versus the Hacker ­nderground: Army of Informers Turned By Fear
From ACM Opinion

Feds Versus the Hacker ­nderground: Army of Informers Turned By Fear

When Jeff Moss, popularly known as the Dark Tangent, started holding underground hacker conferences in Las Vegas he knew he had a problem. All previous gatherings...

From ACM Opinion

On the Latest Google Chinese-Hacking News

Thanks to many people who have written in asking whether the recent Google announcement of a new China-based wave of attacks on Gmail accounts is related to the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account