acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Western Media Seeking to Play Down Iran's Cyber Capability By New Virus Story
From ACM Opinion

Western Media Seeking to Play Down Iran's Cyber Capability By New Virus Story

The western media sought to play down Iran's cyber and computer software capability by releasing hundreds of reports on the discovery of a new computer virus and...

From ACM Opinion

The End of Privacy?

Cellphones, email, and online social networking have come to rule daily life, but Congress has done nothing to update federal privacy laws to better protect digital...

Why There Are Too Many Patents in America
From ACM Opinion

Why There Are Too Many Patents in America

Recently, while sitting as a trial judge, I dismissed a case in which Apple and Motorola had sued each other for alleged infringement of patents for components...

The Sun Shines on 'the Cloud'
From ACM Opinion

The Sun Shines on 'the Cloud'

What's the real lesson to be learned from Amazon's cloud computing failure two weeks ago, the one that knocked Netflix and other Websites offline?

From ACM Opinion

Are Guidelines Issued By Drone Industry an Attempt to Avoid Government Regulation?

The growing use of drones in the United States is facing firm opposition from civil liberties groups and some legislators, like Sen. Rand Paul, R-Ky., and Rep. ...

From ACM Opinion

'lightweight' Drm Isn't the Answer

The world doesn't need another DRM platform, regardless of whether it's called "lightweight." DRM is annoying for customers and provides a false sense of security...

A Weapon We Can't Control
From ACM Opinion

A Weapon We Can't Control

The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush's presidency...

Free Speech For Computers?
From ACM Opinion

Free Speech For Computers?

Do machines speak? If so, do they have a constitutional right to free speech?

How Garmin Failed to See the Iphone Threat
From ACM Opinion

How Garmin Failed to See the Iphone Threat

About nine years ago, I had a question for Min Kao, the CEO of the GPS concern Garmin. His answer was determined, and I thought of it as I watched the news from...

Why Faces Matter to Facebook
From ACM Opinion

Why Faces Matter to Facebook

Facebook really wants to know what you look like.

The Challenges of Privacy By Design
From Communications of the ACM

The Challenges of Privacy By Design

Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense challenges, including management...

Google's Hybrid Approach to Research
From Communications of the ACM

Google's Hybrid Approach to Research

By closely connecting research and development Google is able to conduct experiments on an unprecedented scale, often resulting in new capabilities for the company...

Alan Turing's Other Universal Machine
From Communications of the ACM

Alan Turing's Other Universal Machine

All computer scientists know about the Universal Turing Machine, one of the foundation stones of theoretical computer science. Much less well known is the practical...

An Information Strategy For Environmental Sustainability
From Communications of the ACM

An Information Strategy For Environmental Sustainability

Many proposed solutions to the species-threatening transformations born of human industrialization have an engineering orientation. Often the suggested remedies...

Can Online Piracy Be Stopped By Laws?
From Communications of the ACM

Can Online Piracy Be Stopped By Laws?

Considering the legal responsibilities of Internet intermediaries in the aftermath of the Stop Online Privacy Act controversy.

Business Models For Strategy and Innovation
From Communications of the ACM

Business Models For Strategy and Innovation

While often ambiguously defined, business models are central to innovation.

How Flame Virus Has Changed Everything For Online Security Firms
From ACM Opinion

How Flame Virus Has Changed Everything For Online Security Firms

Here's a question: if you connect an unprotected Windows computer to the Internet, how long will it take before it is infected by malicious software?

The Vulnerabilities Market and the Future of Security
From ACM Opinion

The Vulnerabilities Market and the Future of Security

Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...

World's Largest Organization For Computer Professionals Comes Out Against Cispa
From ACM Opinion

World's Largest Organization For Computer Professionals Comes Out Against Cispa

The U.S. Public Policy Council of the Association of Computing Machinery, representing ACM, came out against CISPA, the cybersecurity legislation recently passed...

Google Fights Back in China
From ACM News

Google Fights Back in China

Two giants on the world stage are battling over the future of information.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account