acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

Clear Need to Define Cyberweapons and Cyberwar

The term cyberwar has become a catch-all used by politicians, talking heads and others to encompass just about any online threat, regardless of the attacker or...

China's Innovation Success Depends on Political Changes
From ACM Opinion

China's Innovation Success Depends on Political Changes

Since 1978, the Chinese economy has seen phenomenal growth. While that’s not in dispute, the reason why China has managed to grow so fast and whether it can maintain...

This Is Your Brain on Neural Implants
From ACM Opinion

This Is Your Brain on Neural Implants

You are in the future with technologies more advanced than today's.

Otellini's Legacy of Intel Profit Marred By Arm Competition
From ACM Opinion

Otellini's Legacy of Intel Profit Marred By Arm Competition

When Intel Chief Executive Paul Otellini retires in May, he'll leave a mixed record.

Kill the Password: Why a String of Characters Can't Protect ­S Anymore
From ACM Opinion

Kill the Password: Why a String of Characters Can't Protect ­S Anymore

You have a secret that can ruin your life.

From ACM Opinion

Was Petraeus Borked?

In 1987, when Judge Robert Bork was enmeshed in a partisan struggle over his Supreme Court nomination, a reporter for an alternative weekly in Washington, D.C.,...

Instead of 'dead Dropping,' Petraeus and Broadwell Should Have ­sed These Email Security Tricks
From ACM Opinion

Instead of 'dead Dropping,' Petraeus and Broadwell Should Have ­sed These Email Security Tricks

Having an extramarital affair in 2012 is not an easy task if you’re the chief of the world’s most renowned spy agency.

The Greatest Bond Villain of All: Technology
From ACM Opinion

The Greatest Bond Villain of All: Technology

Tech has always played a prominent role in the Bond franchise; it's a key element of the plot formula: Bond opens with a chase scene, the core mission is revealed...

From ACM Opinion

A Sample Security Agenda For Obama's Second Term

When Barack Obama was sworn in four years ago for his first term, there was genuine optimism that he would make meaningful improvements to the security of the nation's...

How to Devise Passwords That Drive Hackers Away
From ACM Opinion

How to Devise Passwords That Drive Hackers Away

Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self.

Inside the Secret World of the Data Crunchers Who Helped Obama Win
From ACM Opinion

Inside the Secret World of the Data Crunchers Who Helped Obama Win

In late spring, the backroom number crunchers who powered Barack Obama's campaign to victory noticed that George Clooney had an almost gravitational tug on West...

Is Failure to Predict a Crime?
From ACM Opinion

Is Failure to Predict a Crime?

I learned with disbelief last Monday about the decision of an Italian judge to convict seven scientific experts of manslaughter and to sentence them to six years...

Does a Public "find My Iphone" Search Violate Personal Privacy?
From ACM Opinion

Does a Public "find My Iphone" Search Violate Personal Privacy?

A guy stole my iPhone. I tracked it and posted his address online. Was that wrong?

Few Winners in Heated Cellphone Wars
From ACM Opinion

Few Winners in Heated Cellphone Wars

If you are wondering who will be your cellphone provider next year, so are the cellphone companies.

The Michigan Fight Song and Four Other Reasons to Avoid Internet Voting
From ACM Opinion

The Michigan Fight Song and Four Other Reasons to Avoid Internet Voting

In a Monday article, we described the security and reliability problems that have undermined public confidence in electronic voting machines within the United States...

Cybercrime: Mobile Changes Everything—and No One's Safe
From ACM Opinion

Cybercrime: Mobile Changes Everything—and No One's Safe

The FBI recently put out a mobile malware alert, providing us with a sobering reminder of this "evil software" for phones and tablets.

Can We Trust Voting Machines?
From ACM Opinion

Can We Trust Voting Machines?

Last week, a congressional report claimed that using Chinese telecommunications companies’ goods and services in the United States could threaten national security...

Keeping Technology Promises
From Communications of the ACM

Keeping Technology Promises

Considering new models for educational technology and methods.

Societal Implications of the Emerging Smart Grid
From Communications of the ACM

Societal Implications of the Emerging Smart Grid

Seeking solutions to concerns that go beyond the engineering of the smart grid.

Learning to Teach Computer Science
From Communications of the ACM

Learning to Teach Computer Science: The Need For a Methods Course

A multipronged approach to preparing computer science teachers is critical to success.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account