acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Sony's Kaz Hirai on the Psn Hack
From ACM News

Sony's Kaz Hirai on the Psn Hack

Sony's deputy president about the PlayStation Network hack, PS Vita and PS3's enduring appeal.

The Danger of E-Books
From ACM Opinion

The Danger of E-Books

In an age where business dominates our governments and writes our laws, every technological advance offers business an opportunity to impose new restrictions...

Security 'tokens' Take Hit
From ACM News

Security 'tokens' Take Hit

RSA Security is offering to provide security monitoring or replace its well-known SecurID tokens—devices used by millions of corporate workers to securely log...

Feds Versus the Hacker ­nderground: Army of Informers Turned By Fear
From ACM Opinion

Feds Versus the Hacker ­nderground: Army of Informers Turned By Fear

When Jeff Moss, popularly known as the Dark Tangent, started holding underground hacker conferences in Las Vegas he knew he had a problem. All previous gatherings...

From ACM Opinion

On the Latest Google Chinese-Hacking News

Thanks to many people who have written in asking whether the recent Google announcement of a new China-based wave of attacks on Gmail accounts is related to the...

Making the Case For Security
From ACM News

Making the Case For Security

Major corporations have made serious mistakes with information security recently, resulting in spectacular failures to protect business and customer records....

What Big Data Needs: A Code of Ethical Practices
From ACM Opinion

What Big Data Needs: A Code of Ethical Practices

In this era of Big Data, there is little that cannot be tracked in our online lives—or even in our offline lives. Consider one new Silicon Valley venture, called...

Computer Science Can Use More Science
From Communications of the ACM

Computer Science Can Use More Science

Software developers should use empirical methods to analyze their designs to predict how working systems will behave.

Think Before You Fork
From Communications of the ACM

Think Before You Fork

Kode Vicious's thoughts on forking, config files, and using internal wikis.

The Risks of Stopping Too Soon
From Communications of the ACM

The Risks of Stopping Too Soon

Good software design is never easy, but stopping too soon makes the job more difficult.

Practical Application of Theoretical Estimation
From Communications of the ACM

Practical Application of Theoretical Estimation

One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...

Who Are We - Now?
From Communications of the ACM

Who Are We - Now?

Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.

Identity Management and Privacy
From Communications of the ACM

Identity Management and Privacy: A Rare Opportunity To Get It Right

The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...

From ACM Opinion

Why Library Privacy Matters

Without library privacy, individuals might not engage in free and open inquiry for fear that their interactions with the library will be used against them.

From ACM News

Why You Can't Really Anonymize Your Data

One of the joys of the last few years has been the flood of real-world data sets being released by all sorts of organizations. These usually involve some record...

Andy Rubin: Why Android Is Only Quasi-Open
From ACM News

Andy Rubin: Why Android Is Only Quasi-Open

Android is open-source software, but it doesn't come with much of an open-source community, and the Google leader of the project explained why.

Ralph Langner on Stuxnet, Copycat Threats
From ACM News

Ralph Langner on Stuxnet, Copycat Threats

A year ago, Ralph Langner was plugging away in relative obscurity, doing security consulting work for the industrial control system industry in his Hamburg headquarters...

Seven Questions For Prith Banerjee, Hewlett-Packard's Head of Research
From ACM News

Seven Questions For Prith Banerjee, Hewlett-Packard's Head of Research

It's been about two months since Hewlett-Packard’s new CEO Léo Apotheker put the company on a new cloud-centric path as part of a big speech laying out a new strategy...

There's No Data Sheriff on the Wild Web
From ACM Opinion

There's No Data Sheriff on the Wild Web

A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...

Customers Had More Faith in Sony Than It Deserved
From ACM News

Customers Had More Faith in Sony Than It Deserved

In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account