Sign In

Communications of the ACM

Recent Articles


Articles Interviews Vardi's Insights Opinion Archive Refine your search:
dateMore Than a Year Ago
subjectSoftware
authorThe Washington Post

China's Cyber-Generals Are Reinventing the Art of War
From ACM Opinion

China's Cyber-Generals Are Reinventing the Art of War

The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization...

How Cloud Storage Complicates the Supreme Court Debate Over Cell Phone Privacy
From ACM News

How Cloud Storage Complicates the Supreme Court Debate Over Cell Phone Privacy

Should police be able to search the contents of your smartphone without a warrant?

Driverless Cars Can't Come Soon Enough
From ACM Opinion

Driverless Cars Can't Come Soon Enough

We all know the tragedy of car accidents.

3 Ways to Make Software Patents Suck Less (without Abolishing Them Altogether)
From ACM Opinion

3 Ways to Make Software Patents Suck Less (without Abolishing Them Altogether)

This week, the Supreme Court tackled one of the thorniest problems in tech policy: software patents.

What Oculus's $2 Billion Payday Teaches ­S About Innovation
From ACM Opinion

What Oculus's $2 Billion Payday Teaches ­S About Innovation

Tuesday's announcement that Facebook is buying the virtual-reality start-up Oculus for $2 billion no doubt left many people scratching their heads.

A Four-Minute Explanation of Why Innovation Is So Important to the ­nited States
From ACM Opinion

A Four-Minute Explanation of Why Innovation Is So Important to the ­nited States

What makes America great?

Comcast's Deal with Netflix Makes Network Neutrality Obsolete
From ACM Opinion

Comcast's Deal with Netflix Makes Network Neutrality Obsolete

For the past two decades, the Internet has operated as an unregulated, competitive free market.

The Political Science of Cybersecurity III—How International Relations Theory Shapes U.S. Cybersecurity Doctrine
From ACM Opinion

The Political Science of Cybersecurity III—How International Relations Theory Shapes U.S. Cybersecurity Doctrine

U.S. cybersecurity officials have been much more skeptical about international cooperation than their Cold War counterparts were.

Some Predict Computers Will Produce a Jobless Future. Here's Why They're Wrong.
From ACM Opinion

Some Predict Computers Will Produce a Jobless Future. Here's Why They're Wrong.

Will "smart machines" steal our jobs?

Why Tech Companies and the NSA Diverge on Snowden
From ACM Opinion

Why Tech Companies and the NSA Diverge on Snowden

Is Edward Snowden a whistleblower or a traitor?

Here's Why Tech Companies' Nsa 'transparency Reports' Are Mostly a Pr Stunt
From ACM Opinion

Here's Why Tech Companies' Nsa 'transparency Reports' Are Mostly a Pr Stunt

Technology companies will soon be able to disclose more details about the number of national security orders and requests they receive, according to a joint statement...

From ACM Opinion

Bitcoin—boom or Bubble?

The baffling Bitcoin boom is either an exercise in self-delusion—a high-tech Ponzi scheme that will come crashing down—or an imaginative new Internet technology...

10 Bold Predictions For 2014
From ACM Opinion

10 Bold Predictions For 2014

At the beginning of each year, it's possible to make predictions about the future of the tech sector simply by extrapolating from data in the latest Mary Meeker...

Dogecoins and Litecoins and Peercoins Oh My: What You Need to Know About Bitcoin Alternatives
From ACM News

Dogecoins and Litecoins and Peercoins Oh My: What You Need to Know About Bitcoin Alternatives

By now, most people have heard of Bitcoin, the peer-to-peer currency whose value has soared over the past couple of years.

Correcting the Record on the Nsa Review
From ACM Opinion

Correcting the Record on the Nsa Review

One of the dangers of a 304 -page report on a complex subject is that everyone gets to choose what he or she thinks is the bottom line.

Tor Is Supposed to Hide You Online. In This Harvard Student's Case, It Did the Opposite.
From ACM Opinion

Tor Is Supposed to Hide You Online. In This Harvard Student's Case, It Did the Opposite.

At 9 a.m. Monday, fire alarms went off in Harvard's Emerson Hall.

Why It's a Shame that Computer Science Courses Aren't Mandatory
From ACM Opinion

Why It's a Shame that Computer Science Courses Aren't Mandatory

Millions of students will learn some lessons in computer coding this week as part of "Hour of Code," a national campaign offering free tutorials.

No, Bitcoin Isn't Broken
From ACM Opinion

No, Bitcoin Isn't Broken

"Bitcoin Is Broken," proclaimed Ittay Eyal and Emin Gun Sirer, two Cornell computer scientists.

Here's Everything You Should Know About Nsa Address Book Spying in One Faq
From ACM News

Here's Everything You Should Know About Nsa Address Book Spying in One Faq

A new report from The Washington Post, based on documents provided by whistleblower Edward Snowden, reveals that the National Security Agency is collecting hundreds...

Here's Why Cops Should Be Required to Wear a Lapel Camera While on Duty
From ACM Opinion

Here's Why Cops Should Be Required to Wear a Lapel Camera While on Duty

Police officers in Rialto, Calif., carry cameras to record their every action while on duty.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account