acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

From ACM Opinion

Will Someone Leak the Leaker's Secrets?

Who has the right to decide what information should be kept secret? That's the vexatious question raised by WikiLeaks and its founder Julian Assange, who masterminded...

From ACM Opinion

A Review of Verizon and Google's Net Neutrality Proposal

Efforts to protect net neutrality that involve government regulation have always faced one fundamental obstacle: the substantial danger that the regulators will...

The First Church of Robotics
From ACM Opinion

The First Church of Robotics

This constant stream of stories about artificial intelligence suggests that machines are becoming smart and autonomous, a new form of life, and that we should...

From ACM Opinion

Evil?

The alleged Google-Verizon deal that's endangering net neutrality.

Technology Lessons from the Wikileaks Saga
From ACM Opinion

Technology Lessons from the Wikileaks Saga

There's already debate about whether Wikileaks's release of 92,000 classified documents on the war in Afghanistan was more of a milestone in the annals of national...

Charging the Wikileaks Leaker with Treason Would Be Absurd
From ACM Opinion

Charging the Wikileaks Leaker with Treason Would Be Absurd

Should Pvt. Bradley Manning, the Army intelligence analyst charged with leaking troves of classified documents to WikiLeaks, be tried for treason? And what about...

I Tweet, Therefore I Am
From ACM Opinion

I Tweet, Therefore I Am

On a recent lazy Saturday morning, my daughter and I lolled on a blanket in our front yard, snacking on apricots, listening to a download of E. B. White reading...

From ACM Opinion

Protecting Privacy

On the internet, nobody knows you’re a dog but advertisers may infer that you own one. The flow of information from users of the internet both to social networks...

From ACM Opinion

The Wikileaks Paradox

Is radical transparency compatible with total anonymity?

From ACM Opinion

Cyberwar Is Hell

While we obsessed over Russian spies, top diplomats were working to stop a greater espionage problem: the threat of cyberwarfare.

An Interview With Edsger W. Dijkstra
From Communications of the ACM

An Interview With Edsger W. Dijkstra

The computer science luminary, in one of his last interviews before his death in 2002, reflects on a programmer's life.

Rights For Autonomous Artificial Agents?
From Communications of the ACM

Rights For Autonomous Artificial Agents?

The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.

Remembrances of Things Pest
From Communications of the ACM

Remembrances of Things Pest

Recalling malware milestones.

Presenting Your Project
From Communications of the ACM

Presenting Your Project

The what, the how, and the why of giving an effective presentation.

Has China Caught Up in IT?
From Communications of the ACM

Has China Caught Up in IT?

An assessment of the relative achievements in IT infrastructure, firms, and innovation in China.

Preparing Computer Science Students For the Robotics Revolution
From Communications of the ACM

Preparing Computer Science Students For the Robotics Revolution

Robotics will inspire dramatic changes in the CS curriculum.

Is the Internet a Maturing Market?
From Communications of the ACM

Is the Internet a Maturing Market?

Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband...

From ACM Opinion

Killed By Code: Software Transparency in Implantable Medical Devices

Software is an integral component of a range of devices that perform critical, lifesaving functions and basic daily tasks. As patients grow more reliant on computerized...

Five Things that Could Topple Facebook's Empire
From ACM Opinion

Five Things that Could Topple Facebook's Empire

Facebook is primed to announce this week that it's amassed a half billion active friends, a milestone reinforcing its status as the king of social networks—a company...

From ACM Opinion

Protecting the Data You Don't Even Know You Have

Let's assume for a moment that Google's collection of Wi-Fi "payload" data really was unintentional. And that Google never used the data, didn't even know it...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account