acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

From ACM News

Social Media and Law Enforcement: Who Gets What Data and When?

This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the prying eyes ofreported...

Why Buying Coffee with Your Iphone Matters
From ACM Opinion

Why Buying Coffee with Your Iphone Matters

Starbucks app Cash, credit, or gadget?

From ACM Opinion

Stuxnet Authors Made Several Basic Errors

There is a growing sentiment among security researchers that the programmers behind the Stuxnet attack may not have been the super-elite cadre of developers that...

From ACM News

Nsa's Home Base May Have Crappiest Web Site Ever

Through the gates of Fort George Meade pass the most powerful technical minds that the government employs. But Fort Meade's website contains pixelized, faux-shaded...

Success of Verizon's Iphone Will Depend on Cdma Network Performance
From ACM Opinion

Success of Verizon's Iphone Will Depend on Cdma Network Performance

Professor P.K. Kannan at the University of Maryland, says the success of the iPhone 4 released by Verizon boils down to one word: "performance.  That is, the performance...

The Case Against the Consumer Electronics Show
From ACM Opinion

The Case Against the Consumer Electronics Show

A year ago, Steve Ballmer took the stage of the Consumer Electronics Show to tout a technology that he promised would change the world: the Windows operating...

From ACM News

Hackers Find New Way to Cheat on Wall Street

High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers who can inject tiny amounts...

The American Wikileaks Hacker
From ACM News

The American Wikileaks Hacker

Jacob Appelbaum fights repressive regimes around the world—including his own.

Android Programming's ­ps and Downs
From ACM Opinion

Android Programming's ­ps and Downs

As smartphones using Google's Android operating system become mainstream, James Steele and Nelson To are in a pretty good position.

From ACM Opinion

10 Things Web ­sers Should Fear in 2011

As in the real world, cyberspace has bad neighborhoods. But unlike the real world, risks in cyberspace are not easy to spot—and the location of those digital...

From Communications of the ACM

The Ephemeral Legion: Producing an Expert Cyber-Security Work Force from Thin Air

Seeking to improve the educational mechanisms for efficiently training large numbers of information security workers.

An Interview with Frances E. Allen
From Communications of the ACM

An Interview with Frances E. Allen

Frances E. Allen, recipient of the 2006 ACM A.M. Turing Award, reflects on her career.

Cloud Computing Privacy Concerns on Our Doorstep
From Communications of the ACM

Cloud Computing Privacy Concerns on Our Doorstep

Privacy and confidentiality issues in cloud-based conference management systems reflect more universal themes.

Reflections on the Toyota Debacle
From Communications of the ACM

Reflections on the Toyota Debacle

A look in the rearview mirror reveals system and process blind spots.

Google AdWords and European Trademark Law
From Communications of the ACM

Google AdWords and European Trademark Law

Is Google violating trademark law by operating its AdWords system?

Don't Bring Me a Good Idea
From Communications of the ACM

Don't Bring Me a Good Idea

You want to know how to get my attention?" Jason Kalich asked the audience rhetorically. "First off, don't bring me a good...

The Brainy Learning Algorithms of Numenta
From ACM News

The Brainy Learning Algorithms of Numenta

How the inventor of the PalmPilot studied the workings of the human brain to help companies turn a deluge of data into business intelligence.

Web Giants Get Bigger, Location Takes Off
From ACM News

Web Giants Get Bigger, Location Takes Off

The easiest way to sum up the Web in 2010 is that it was a year of growth. The big got bigger and smaller companies came out of the woodwork with new plays on...

From ACM Opinion

Stuxnet's Finnish-Chinese Connection

I recently wrote a white paper entitled “Dragons, Tigers, Pearls, and Yellowcake” in which I proposed four alternative scenarios for the Stuxnet worm other than...

From ACM Opinion

Time to Loosen Google's Grip?

In case you hadn't noticed, Google isn't just a Web search company any longer. In addition to online advertising, it's moving into operating system and application...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account