acm-header
Sign In

Communications of the ACM

Recent Articles


Articles Interviews Vardi's Insights Chien's Vantage Opinion Archive Refine your search:
dateMore Than a Year Ago
subjectPerformance And Reliability
authorThe New York Times
bg-corner

From ACM Opinion

A New Kind of Warfare

Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals, and foreign governments,...

From ACM Opinion

Apple Case Muddies the Future of Innovations

Apple's victory on Friday in a patent lawsuit against Samsung could, if upheld, give its rivals a kick in the pants to create more original products.

Giving In to the Surveillance State
From ACM Opinion

Giving In to the Surveillance State

In March 2002, John M. Poindexter, a former national security adviser to President Ronald Reagan, sat down with Gen. Michael V. Hayden, the director of the National...

Exploring the Planets Enriches ­S at Home
From ACM Opinion

Exploring the Planets Enriches ­S at Home

NASA's newest marvel, a one-ton rover named Curiosity, has been set down with all the delicacy of a carton of eggs on the surface of Mars.

Trust: Ill-Advised in a Digital Age
From ACM Opinion

Trust: Ill-Advised in a Digital Age

Bruce Schneieer ordered a Coke, no ice, at the Rio casino on a Saturday afternoon. I ordered Diet Coke, also no ice, and handed the bartender an American Express...

Suggestions For an Apple Shopping List
From ACM Opinion

Suggestions For an Apple Shopping List

Question: What would you do if you had $117 billion?

The Frightening Things You Hear at a Black Hat Conference
From ACM Opinion

The Frightening Things You Hear at a Black Hat Conference

Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.

With Apple
From ACM Opinion

With Apple

Late last summer, I was introduced to a new special someone. I wasn’t looking to meet this new muse; it all just kind of happened.

Desktop Computers Look More and More Like Smartphones
From ACM Opinion

Desktop Computers Look More and More Like Smartphones

If you're an experienced computer user, you probably remember explaining to newbies how a desktop computer worked: Your photos should go in this folder; your documents...

Apple's Stash of Credit Card Numbers Is Its Secret Weapon
From ACM News

Apple's Stash of Credit Card Numbers Is Its Secret Weapon

That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.

Why Attack When We Can't Defend?
From ACM Opinion

Why Attack When We Can't Defend?

In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...

The Flight From Conversation
From ACM Opinion

The Flight From Conversation

We live in a technological universe in which we are always communicating. And yet we have sacrificed conversation for mere connection.

From ACM Opinion

Apple's Mountain Lion Makes the Mac More Like the Ipad

Apple's iPhones and iPads get most of the attention, but Apple is now directing the spotlight on the Mac.

Welcome to the 'knowosphere'
From ACM Opinion

Welcome to the 'knowosphere'

Here's my take on what I've begun calling the "knowosphere"—a word intentionally echoing the more allegorical "noosphere," the "planet of the mind" of Vladimir....

From ACM Opinion

The Future of Moral Machines

A robot walks into a bar and says, "I’ll have a screwdriver." A bad joke, indeed. But even less funny if the robot says "Give me what’s in your cash register."...

From ACM Opinion

Running Out of Bandwidth

At a time of slow economic growth and declining competitiveness, wireless technology remains a shining example of innovation. In the last 10 years, wireless communications...

Steve Jobs and the Economics of Elitism
From ACM Opinion

Steve Jobs and the Economics of Elitism

The more, the better. That’s the fashionable recipe for nurturing new ideas these days. It emphasizes a kind of Internet-era egalitarianism that celebrates the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account