acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

The Void's Creator Details His Vision For ­nleashing Virtual Reality's Full Potential
From ACM Opinion

The Void's Creator Details His Vision For ­nleashing Virtual Reality's Full Potential

In a 60-by-60-foot room in Salt Lake City, Ken Bretschneider is taking virtual reality experiences to another level.

Honoring Technology's Power Couple: Moore's Law and the Network Effect
From ACM Opinion

Honoring Technology's Power Couple: Moore's Law and the Network Effect

Sunday marked the 50th anniversary of Moore's Law, which I believe to be one of the most important business theorems of the last century.

10 Images that Explain the Incredible Power of Moore's Law
From ACM Opinion

10 Images that Explain the Incredible Power of Moore's Law

Moore's Law, which states that the number of transistors per integrated circuit will double approximately every 18–24 months, has become the defining metaphor of...

After Net Neutrality Vote, an ­ncertain Future For the Internet
From ACM Opinion

After Net Neutrality Vote, an ­ncertain Future For the Internet

Thursday, during a rancorous meeting of the Federal Communications Commission, the agencyvoted 3-2 to impose public utility regulations on Internet access providers...

What 'the Imitation Game' Didn't Tell You About Turing's Greatest Triumph
From ACM Opinion

What 'the Imitation Game' Didn't Tell You About Turing's Greatest Triumph

Freeman Dyson, 91, the famed physicist, author and oracle of human destiny, is holding forth after tea-time one February afternoon in the common room of the Institute...

Robots Are Sneaking ­p On Congress (along with Four Other Tech Trends)
From ACM Opinion

Robots Are Sneaking ­p On Congress (along with Four Other Tech Trends)

One of the best Twitter accounts inside the Beltway or out—belongs to former representativeJohn Dingell (D-Mich.), who announced his retirement with self-effacing...

A Q&a With the Hackers Who Say They Helped Break Into Sony's Network
From ACM Opinion

A Q&a With the Hackers Who Say They Helped Break Into Sony's Network

Lizard Squad. That's the hacker group whose name is suddenly on everyone's lips after it took credit for ruining Christmas for PlayStation and Xbox gamers everywhere...

These Are 3 Breakthrough Science Ideas You'll Be Talking About in 2015
From ACM Opinion

These Are 3 Breakthrough Science Ideas You'll Be Talking About in 2015

For anyone who has ever said that all the STEM professions need is something to make them "cool" in order to attract more young people, look no further than ...

The Toughest Case: What If Osama Bin Laden Had an Iphone?
From ACM Opinion

The Toughest Case: What If Osama Bin Laden Had an Iphone?

In rebuking Apple and Google for their new smartphone encryption polices on Thursday, FBI Director James B. Comey became the latest law enforcement official to...

Why Internet Governance Should Be Left to the Engineers
From ACM Opinion

Why Internet Governance Should Be Left to the Engineers

As the Internet and the disruptive innovations it spawns are becoming economically, politically, and culturally vital for the world’s three billion users (and counting)...

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone
From ACM Opinion

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone

In the computer and network security industry, few people are as well known as Dan Geer.

How to Talk About Blowing Things ­p in Cyberspace, According to the Military
From ACM Opinion

How to Talk About Blowing Things ­p in Cyberspace, According to the Military

Bombs are relatively simple, when you boil everything down.

China's Cyber-Generals Are Reinventing the Art of War
From ACM Opinion

China's Cyber-Generals Are Reinventing the Art of War

The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization...

How Cloud Storage Complicates the Supreme Court Debate Over Cell Phone Privacy
From ACM News

How Cloud Storage Complicates the Supreme Court Debate Over Cell Phone Privacy

Should police be able to search the contents of your smartphone without a warrant?

A Veteran Programmer Explains How the Stock Market Became "Rigged"
From ACM Opinion

A Veteran Programmer Explains How the Stock Market Became "Rigged"

A small group of financial firms are using their technological superiority to skim the top off the market, Michael Lewis claims in his new book "Flash Boys."

What Oculus's $2 Billion Payday Teaches ­S About Innovation
From ACM Opinion

What Oculus's $2 Billion Payday Teaches ­S About Innovation

Tuesday's announcement that Facebook is buying the virtual-reality start-up Oculus for $2 billion no doubt left many people scratching their heads.

Hackers Allegedly Stole $400 Million in Bitcoins. Here's How to Catch Them.
From ACM Opinion

Hackers Allegedly Stole $400 Million in Bitcoins. Here's How to Catch Them.

On Friday, what had been the world's leading Bitcoin exchange declared bankrutpcy, claiming that hackers had exploited a technical issue called "transaction malleability...

Everything You Need to Know About the Latest Bitcoin Crisis
From ACM Opinion

Everything You Need to Know About the Latest Bitcoin Crisis

The once-popular Bitcoin exchange Mt. Gox has gone dark.

Comcast's Deal with Netflix Makes Network Neutrality Obsolete
From ACM Opinion

Comcast's Deal with Netflix Makes Network Neutrality Obsolete

For the past two decades, the Internet has operated as an unregulated, competitive free market.

The Political Science of Cybersecurity III—How International Relations Theory Shapes U.S. Cybersecurity Doctrine
From ACM Opinion

The Political Science of Cybersecurity III—How International Relations Theory Shapes U.S. Cybersecurity Doctrine

U.S. cybersecurity officials have been much more skeptical about international cooperation than their Cold War counterparts were.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account