acm-header
Sign In

Communications of the ACM

Recent Interviews


bg-corner

How the ­.s. Could Escalate Its Name-and-Shame Campaign Against China's Espionage
From ACM Opinion

How the ­.s. Could Escalate Its Name-and-Shame Campaign Against China's Espionage

Earlier this week the U.S. Department of Justice indicted five Chinese military officers for industrial espionage, accusing them of leading attacks on the computers...

Three Questions with the Man Leading Baidu's New AI Effort
From ACM Opinion

Three Questions with the Man Leading Baidu's New AI Effort

Artificial intelligence is guided by the far-off goal of having software match humans at important tasks.

The Myths & Realities of How the Eu's New 'right To Be Forgotten' in Google Works
From ACM Opinion

The Myths & Realities of How the Eu's New 'right To Be Forgotten' in Google Works

Is it true that anyone in the EU can have anything removed from Google and other search engines?

"we're at Greater Risk": General Keith Alexander
From ACM Opinion

"we're at Greater Risk": General Keith Alexander

Since Edward Snowden's revelations about government surveillence, we know more about how the National Security Agency has been interpreting Section 215 of the Patriot...

Former Head of the Nsa and Commander of the ­S Cyber Command, General Keith Alexander
From ACM Opinion

Former Head of the Nsa and Commander of the ­S Cyber Command, General Keith Alexander

Recently retired director of the U.S. National Security Agency and commander of the U.S. Cyber Command General Keith Alexander was interviewed by Australian Financial...

Getting Everyday Objects to Think
From ACM Opinion

Getting Everyday Objects to Think

If the so-called Internet of Things ever becomes one of those proverbial next big things in technology, Thomas Lee, a card-carrying member of the cohort of big...

Eugene Kaspersky: Major Cyberterrorist Attack Is Only Matter of Time
From ACM Opinion

Eugene Kaspersky: Major Cyberterrorist Attack Is Only Matter of Time

A major, global cyberterrorist attack has long been the stuff of fiction, the threat that a malevolent hacker could bring down businesses, sabotage power plants...

Mark Zuckerberg on Facebook's Future, From Virtual Reality to Anonymity
From ACM Opinion

Mark Zuckerberg on Facebook's Future, From Virtual Reality to Anonymity

No one ever accused Mark Zuckerberg of standing pat.

Michael Lewis on Exposing Wall Street's Biggest High-Tech Swindle
From ACM Opinion

Michael Lewis on Exposing Wall Street's Biggest High-Tech Swindle

Flash Boys explores the world of high-frequency trading, a scheme in which traders use ultra-fast network connections to sniff out the intentions of other, slower...

Heartbleed: Developer Who Introduced the Error Regrets 'oversight'
From ACM Opinion

Heartbleed: Developer Who Introduced the Error Regrets 'oversight'

The developer who introduced the "Heartbleed" vulnerability to the open-source code used by thousands of websites has told the Guardian it was an "oversight"—but...

Three Questions For Eugene Kaspersky
From ACM Opinion

Three Questions For Eugene Kaspersky

The Moscow-based computer security firm Kaspersky Lab has analyzed major new kinds of malware, including Stuxnet, which four years ago was revealed to have damaged...

The Complexonaut
From ACM Opinion

The Complexonaut

When he was in elementary school, Scott Aaronson, like many mathematically precocious kids of his generation, dreamed of making his own video games.

A Veteran Programmer Explains How the Stock Market Became "Rigged"
From ACM Opinion

A Veteran Programmer Explains How the Stock Market Became "Rigged"

A small group of financial firms are using their technological superiority to skim the top off the market, Michael Lewis claims in his new book "Flash Boys."

Vint Cerf: CS Changes Needed To Address Iot Security, Privacy
From ACM Opinion

Vint Cerf: CS Changes Needed To Address Iot Security, Privacy

The Internet of Things has tremendous potential but also poses a tremendous risk if the underlying security of Internet of Things devices is not taken into account...

While Warning of Chinese Cyberthreat, ­.s. Launches Its Own Attack
From ACM Opinion

While Warning of Chinese Cyberthreat, ­.s. Launches Its Own Attack

The U.S. government has long complained about Chinese hacking and cyberattacks, but new documents show that the National Security Agency managed to penetrate the...

Building Bicep2: A Conversation with Jamie Bock
From ACM Opinion

Building Bicep2: A Conversation with Jamie Bock

Caltech Professor of Physics Jamie Bock and his collaborators announced on March 17, 2014 that they have successfully measured a B-mode polarization signal in the...

Three Questions For Leslie Lamport, Winner of Computing's Top Prize
From ACM Opinion

Three Questions For Leslie Lamport, Winner of Computing's Top Prize

This year's winner of the Turing Award—often referred to as the Nobel Prize of computing—was announced yesterday as Leslie Lamport, a computer scientist whose research...

The Search For Life Across the ­niverse
From ACM Opinion

The Search For Life Across the ­niverse

When Jeremy Drake was beginning his career in the late 1980s, the question of whether or not we are alone in the universe still seemed beyond the realm of scienc...

Are You Too Paranoid About Digital Privacy, or Not Paranoid Enough?
From ACM Opinion

Are You Too Paranoid About Digital Privacy, or Not Paranoid Enough?

Let's start with one thing you hear over and over again when interviewing people about privacy: "I've got nothing to hide."

Hackers Allegedly Stole $400 Million in Bitcoins. Here's How to Catch Them.
From ACM Opinion

Hackers Allegedly Stole $400 Million in Bitcoins. Here's How to Catch Them.

On Friday, what had been the world's leading Bitcoin exchange declared bankrutpcy, claiming that hackers had exploited a technical issue called "transaction malleability...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account