acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

From ACM Opinion

How Movies Activate Your Neural G-Spot

Here’s a typical “date night” with me and Hollywood: I don’t know what I want to see. Neither does Hollywood. But it bangs on my eyeballs and eardrums like Stanley...

From ACM Opinion

'don't Be Evil,' Meet 'spy on Everyone': How the Nsa Deal Could Kill Google

The company once known for its "don't be evil" motto is now in bed with the spy agency known for the mass surveillance of American citizens. The National Security...

Dark Clouds Gather Over Online Security
From ACM Opinion

Dark Clouds Gather Over Online Security

Google may have threatened to leave China in order to keep us all from concluding that "the cloud" can't be secured. But isn't that precisely what we should conclude...

From ACM Opinion

What Apple's Ipad Means For Your Wallet


From ACM Opinion

Don't Become a Tool of Hegemony, Google!

President of People's Daily Online He Jiazheng speaks on Internet freedom: The Google-China dispute shows a strategic position change of the United States. In...

­.s. Enables Chinese Hacking of Google
From ACM Opinion

­.s. Enables Chinese Hacking of Google

Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such as Gmail, in a politically motivated attempt...

From ACM Opinion

Comment: Internet New Shot in the Arm For ­S Hegemony

Over the past 40 years, the US has been dominating the world Internet as the core technique holder with an inherent advantage of being the cradle of the Internet...

Open Access to Scientific Publications
From Communications of the ACM

Open Access to Scientific Publications

In his July 2009 Communications editor's letter "Open, Closed, or Clopen Access?", editor-in-chief Moshe Vardi addressed...

The Need For a National Cybersecurity R&D Agenda
From Communications of the ACM

The Need For a National Cybersecurity R&D Agenda

Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.

Why an Informatics Degree?
From Communications of the ACM

Why an Informatics Degree?

Isn't computer science enough?

Not Seeing the Crime For the Cameras?
From Communications of the ACM

Not Seeing the Crime For the Cameras?

Why it is difficult — but essential — to monitor the effectiveness of security technologies.

From ACM Opinion

Outsourcing Makes A Comeback

After fizzling out over the past couple years, outsourcing is back in vogue. A new PricewaterhouseCoopers study shows outsourcing has roared back to life in the...

From ACM Opinion

A Conversation With Google

Google CEO Eric Schmidt has long defended his company's decision to do business in China despite the restrictions that Beijing imposes on Internet freedom. Nevertheless...

Q&A: HP's Running Man
From Communications of the ACM

Q&A: HP's Running Man

Prith Banerjee discusses collaborating with universities, his startup experiences, and Hewlett-Packard Lab's approach to research and development.

The Evolution of Platform Thinking
From Communications of the ACM

The Evolution of Platform Thinking

How platform adoption can be an important determinant of product and technological success.

Five Questions For Francine Berman
From ACM Opinion

Five Questions For Francine Berman

The winner of the inaugural Ken Kennedy Award, Francine Berman answers questions about her career, the reasons for her success, and the most important lessons she's...

Five Questions For Francine Berman
From ACM Opinion

Five Questions For Francine Berman

The winner of the inaugural Ken Kennedy Award, Francine Berman answers questions about her career, the reasons for her success, and the most important lessons she's...

From ACM Opinion

Connecting with an Internet Pioneer, 40 Years Later

Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...

From ACM Opinion

Connecting with an Internet Pioneer, 40 Years Later

Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...

Conquering the Digital Data Overload
From ACM TechNews

Conquering the Digital Data Overload

University of Utah computer scientist Juliana Freire is working to find data that could be missed in the quagmire of technology available, and to manage and integrate...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account