acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Increasingly Blurry Line Between Big Data and Big Brother
From ACM Opinion

The Increasingly Blurry Line Between Big Data and Big Brother

The potential benefits of "big data" have been well described, both by us and others: the ability to spot flu trends earlier and potentially save lives, for example...

Eric Schmidt ­nloads on China in New Book
From ACM Opinion

Eric Schmidt ­nloads on China in New Book

Google executive chairman Eric Schmidt is brutally clear: China is the most dangerous superpower on Earth.

Inside the Targeted Attack on The New York Times
From ACM Opinion

Inside the Targeted Attack on The New York Times

The Chinese group behind the targeted attack on The New York Times was laser focused on accessing the email of a reporter and the newspaper’s former Beijing bureau...

A Fuzzy and Shifting Line Between Hacker and Criminal
From ACM Opinion

A Fuzzy and Shifting Line Between Hacker and Criminal

In January 2011, I was assigned to cover a hearing in Newark, where Daniel Spitler, then 26, stood accused of breaching AT&T's servers and stealing 114,000 email...

The Two Classes of Cyber Threats
From ACM Opinion

The Two Classes of Cyber Threats

There is one number that matters most in cybersecurity.

The Explosive Growth of Postdocs in Computer Science
From Communications of the ACM

The Explosive Growth of Postdocs in Computer Science

Considering the factors influencing the recent rapid increase in the number of postdoctoral positions in computer science.

Cloud Services Certification
From Communications of the ACM

Cloud Services Certification

How to address the lack of transparency, trust, and acceptance in cloud services.

The Value of Microprocessor Designs
From Communications of the ACM

The Value of Microprocessor Designs

Applying a centuries-old technique to modern cost estimation.

Reflections on Stanford's MOOCs
From Communications of the ACM

Reflections on Stanford's MOOCs

New possibilities in online education create new challenges.

Divided By Division
From Communications of the ACM

Divided By Division

Is there a "best used by" date for software?

More Sight on Foresight
From Communications of the ACM

More Sight on Foresight

My previous column, "The Foresight Saga, Redux," began a discussion that is continued here regarding some lessons learned from the 2012 U.S. November elections. In...

The Tangled Web We Have Woven
From Communications of the ACM

The Tangled Web We Have Woven

Seeking to protect the fundamental privacy of network interactions.

Becoming Biohackers: Learning the Game
From ACM Careers

Becoming Biohackers: Learning the Game

When you have lunch courtesy of the FBI, you are offered chicken Caesar salad, hamburger, or fish.

From ACM Opinion

Google's Approach to Government Requests For ­ser Data

Today, January 28, is Data Privacy Day, when the world recognizes the importance of preserving your online privacy and security.

Crapware Won't Crap Out
From ACM Opinion

Crapware Won't Crap Out

For a few years now, I've been expecting to write an obituary for crapware. Or not an obit, exactly—I was hoping to dance on its grave.

Jill and Scott Kelley on the Petraeus Scandal and Loss of Privacy
From ACM Opinion

Jill and Scott Kelley on the Petraeus Scandal and Loss of Privacy

We woke up on the morning of Nov. 9 expecting the usual: for one of us, the tending to patients; for the other, the morning rush of packing lunches and getting...

Hacktivism: Civil Disobedience or Cyber Crime?
From ACM Opinion

Hacktivism: Civil Disobedience or Cyber Crime?

When Reddit co-founder and internet freedom activist Aaron Swartz committed suicide, he was facing up to 13 felony counts, 50 years in prison, and millions of dollars...

The Fbi Needs Hackers, Not Backdoors
From ACM Opinion

The Fbi Needs Hackers, Not Backdoors

Just imagine if all the applications and services you saw or heard about at CES earlier this month had to be designed to be "wiretap ready" before they could be...

What the Fbi Doesn't Want You To Know About Its 'secret' Surveillance Techniques
From ACM Opinion

What the Fbi Doesn't Want You To Know About Its 'secret' Surveillance Techniques

The FBI had to rewrite the book on its domestic surveillance activities in the wake of last January’s landmark Supreme Court decision in United States v. Jones.

Forget Oracle's Latest Java Patch. Just Kill the Program in Your Browser For Good
From ACM Opinion

Forget Oracle's Latest Java Patch. Just Kill the Program in Your Browser For Good

After months of inaction and even a warning from the Department of Homeland Security, Oracle has finally released a fix for yet another security vulnerability in...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account