acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

From ACM Opinion

China's Cyberassault on America

In justifying U.S. involvement in Libya, the Obama administration cited the "responsibility to protect" citizens of other countries when their governments engage...

From ACM News

All Your Bitcoins Are Ours

Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...

Seven Questions For IBM Fellow Bernie Meyerson
From ACM Opinion

Seven Questions For IBM Fellow Bernie Meyerson

There aren’t many technology companies around who can claim to be 100 years old. You're probably hearing that a lot as  media outlets report on the anniversary...

From ACM News

Who Is Behind the Hacks?

Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...

From ACM Opinion

How I Failed, Failed, and Finally Succeeded at Learning How to Code

When Colin Hughes was about 11 years old his parents brought home a rather strange toy. It wasn't colorful or cartoonish; it didn't seem to have any lasers or...

From ACM Opinion

Internet Piracy and How to Stop It

Online piracy is a huge business. A recent study found that Web sites offering pirated digital content or counterfeit goods, like illicit movie downloads or bootleg...

Sony's Kaz Hirai on the Psn Hack
From ACM News

Sony's Kaz Hirai on the Psn Hack

Sony's deputy president about the PlayStation Network hack, PS Vita and PS3's enduring appeal.

Watson's Lead Developer: 'deep Analysis, Speed, and Results'
From ACM News

Watson's Lead Developer: 'deep Analysis, Speed, and Results'

David Ferrucci’s official title is "IBM Fellow and Leader of the Semantic Analysis and Integration Department at IBM's T.J. Watson Research Center." But to the...

Security 'tokens' Take Hit
From ACM News

Security 'tokens' Take Hit

RSA Security is offering to provide security monitoring or replace its well-known SecurID tokens—devices used by millions of corporate workers to securely log...

Feds Versus the Hacker ­nderground: Army of Informers Turned By Fear
From ACM Opinion

Feds Versus the Hacker ­nderground: Army of Informers Turned By Fear

When Jeff Moss, popularly known as the Dark Tangent, started holding underground hacker conferences in Las Vegas he knew he had a problem. All previous gatherings...

Making the Case For Security
From ACM News

Making the Case For Security

Major corporations have made serious mistakes with information security recently, resulting in spectacular failures to protect business and customer records....

Darpa's Regina Dugan on 'the Nation
From ACM News

Darpa's Regina Dugan on 'the Nation

Dr. Regina Dugan is director of the Defense Advance Research Projects Agency, where she researches, develops, and demonstrates high-risk, high-payoff projects...

Parting Shots from a Mars Rover
From ACM News

Parting Shots from a Mars Rover

NASA is no longer sending commands to the Spirit rover on Mars, but the long-silent robot still has a few more chances to phone home. Not that anyone is expecting...

Vint Cerf on the Internet and Out-of-This-World Communications
From ACM News

Vint Cerf on the Internet and Out-of-This-World Communications

Vint Cerf is one of the most recognized network engineers of all time. He is often referred to as one of the "fathers of the Internet" for his groundbreaking...

Intel Anthropologist: Fieldwork with the Silicon Tribe
From ACM News

Intel Anthropologist: Fieldwork with the Silicon Tribe

Anthropologist Genevieve Bell gives the chip maker insight into how people experience new technologies.

Bill Would Keep Big Brother's Mitts Off Your Gps Data
From ACM News

Bill Would Keep Big Brother's Mitts Off Your Gps Data

The reauthorization of the Patriot Act looks like a forgone conclusion. But next month, a bipartisan band of legislators will try to mitigate a different kind...

A Day With John Lasseter, King of Pixar
From ACM Opinion

A Day With John Lasseter, King of Pixar

In today's hyper-networked world, where anyone can reach anybody at any time, John Lasseter is something of an anachronism. Though he is routinely armed with...

From ACM Opinion

Windows 8: What Should Be, If You Ask Me

What's next for Microsoft Windows? With Windows 7 now 19 months old, plenty of people are curious about its successor, a product that everybody's calling Windows...

What Big Data Needs: A Code of Ethical Practices
From ACM Opinion

What Big Data Needs: A Code of Ethical Practices

In this era of Big Data, there is little that cannot be tracked in our online lives—or even in our offline lives. Consider one new Silicon Valley venture, called...

Think Before You Fork
From Communications of the ACM

Think Before You Fork

Kode Vicious's thoughts on forking, config files, and using internal wikis.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account