acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Every Computer System Can Be Compromised
From ACM Opinion

Every Computer System Can Be Compromised

Unfortunately, there are many risks inherent in online banking and debit cards.

We Want Privacy, but Can't Stop Sharing
From ACM Opinion

We Want Privacy, but Can't Stop Sharing

Imagine a world suddenly devoid of doors.

Cyber Spy High: Meet the Nsa's Hacker Recruiter
From ACM Opinion

Cyber Spy High: Meet the Nsa's Hacker Recruiter

The National Security Agency has a recruiting problem.

How Humans Could Inhabit the Solar System
From ACM Opinion

How Humans Could Inhabit the Solar System

With our rising planet's population competing for space and resources, some people are convinced we need to look beyond Earth to help ensure humanity's survival...

What It Will Take For Computers to Be Conscious
From ACM Opinion

What It Will Take For Computers to Be Conscious

Is a worm conscious? How about a bumblebee? Does a computer that can play chess "feel" anything?

A Rare Look at Design Genius Jony Ive: The Man Behind the Apple Watch
From ACM Opinion

A Rare Look at Design Genius Jony Ive: The Man Behind the Apple Watch

I first catch sight of Jony Ive across the Apple campus, in a plain Dodger-blue T-shirt and white painter's pants, in conversation, nodding.

The Google Formula For Success
From ACM Careers

The Google Formula For Success

Can Google’s winning ways be applied to all kinds of businesses?

Cyborgs: The Truth About Human Augmentation
From ACM Opinion

Cyborgs: The Truth About Human Augmentation

At the height of summer, when London was baking in unseasonable heat, I made an ill-fated trip to the Serpentine lido in central London.

The Toughest Case: What If Osama Bin Laden Had an Iphone?
From ACM Opinion

The Toughest Case: What If Osama Bin Laden Had an Iphone?

In rebuking Apple and Google for their new smartphone encryption polices on Thursday, FBI Director James B. Comey became the latest law enforcement official to...

A Turing Tale
From Communications of the ACM

A Turing Tale

Assessing the accuracy of popular descriptions of Alan Turing's influences and legacy.

Disrupting and Transforming the -University
From Communications of the ACM

Disrupting and Transforming the -University

Higher education institutions must modify their business models in response to technology-driven influences.

Vendor: Vidi, Vici
From Communications of the ACM

Vendor: Vidi, Vici

Some hidden costs of outsourcing.

Outsourcing Responsibility
From Communications of the ACM

Outsourcing Responsibility

What do you do when your debugger fails you?

Risks and Myths of Cloud Computing and Cloud Storage
From Communications of the ACM

Risks and Myths of Cloud Computing and Cloud Storage

Considering existing and new types of risks inherent in cloud services.

The Bitcoin Ecosystem
From Communications of the ACM

The Bitcoin Ecosystem

Speculating on how the Bitcoin economy might evolve.

Soft Infrastructure Challenges to Scientific Knowledge Discovery
From Communications of the ACM

Soft Infrastructure Challenges to Scientific Knowledge Discovery

Seeking to overcome nontechnical challenges to the scientific enterprise.

Exploratory Engineering in Artificial Intelligence
From Communications of the ACM

Exploratory Engineering in Artificial Intelligence

Using theoretical models to plan for AI safety.

Learning For the New Digital Age
From Communications of the ACM

Learning For the New Digital Age

Digital machines are automating knowledge work at an accelerating pace. How shall we learn and stay relevant?

We Have Never Been Digital
From Communications of the ACM

We Have Never Been Digital

Reflections on the intersection of computing and the humanities.

Accountability in Future Internet Architectures
From Communications of the ACM

Accountability in Future Internet Architectures

Can technical and legal aspects be happily intertwined?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account