acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

From ACM Opinion

Sneaky Apps That Track Cellphones

A perversion of smartphone technology called "stalking apps"—precise, secretive trackings of the movements of cellphone users—is increasingly a matter of national...

How Technology Has Restored the Soul of Politics
From ACM Opinion

How Technology Has Restored the Soul of Politics

In 1979, I was an aeronautical-engineering major at San Jose State University, sneaking time in the laser lab to make holograms or running over to the computer...

Forget Yolo: Why 'big Data' Should Be the Word of the Year
From ACM Opinion

Forget Yolo: Why 'big Data' Should Be the Word of the Year

"Big Data" hasn't made any of the words-of-the-year lists I've seen so far. That's probably because it didn't get the wide public exposure given to items like "...

Who Owns the Content You ­pload Online?
From ACM Opinion

Who Owns the Content You ­pload Online?

The outrage over Instagram's announcement that it is changing its terms and conditions has turned the spotlight on the relationship between websites and users who...

The Man Looking to Turn Samsung Into a Silicon Valley Trendsetter
From ACM Opinion

The Man Looking to Turn Samsung Into a Silicon Valley Trendsetter

Samsung Electronics is a company at the top of its game, having become the world’s leading smartphone manufacturer in the last year.

The Woman Charged With Making Windows 8 Succeed
From ACM Opinion

The Woman Charged With Making Windows 8 Succeed

As the head of Windows product development at Microsoft, Julie Larson-Green is responsible for a piece of software used by some 1.3 billion people worldwide.

Conference-Journal Hybrids
From Communications of the ACM

Conference-Journal Hybrids

Considering how to combine the best elements of conferences and journals.

What College Could Be Like
From Communications of the ACM

What College Could Be Like

Imagining an optimized education model.

Five Lessons from Really Good History
From Communications of the ACM

Five Lessons from Really Good History

Lessons learned from four award-winning books on the history of information technology.

Beyond Location
From Communications of the ACM

Beyond Location: Data Security in the 21st Century

Viewing evolving data security issues as engineering problems to be solved.

How We Build Things
From Communications of the ACM

How We Build Things: . . . and Why Things Are 90% Complete

It seems to be a law of software development that things always take longer than we expect. When a project manager talks to a designer, programmer, or tester...

The Apple-Samsung Lawsuits
From Communications of the ACM

The Apple-Samsung Lawsuits

In search of a middle ground in the intellectual property wars.

Five Big Tech Stories to Watch For in 2013
From ACM Opinion

Five Big Tech Stories to Watch For in 2013

We were dazzled by an array of smartphones. We were fascinated and then disappointed by Facebook's initial public offering. And we held our breaths as we awaited...

Quantum Networks May Be More Realistic Than We Thought
From ACM Opinion

Quantum Networks May Be More Realistic Than We Thought

The nice thing about buzzwords, though, is that some people take them seriously while also recognizing the problems inherent to the idea.

The Real Brothers Grimm Were Stranger Than Fiction
From ACM Opinion

The Real Brothers Grimm Were Stranger Than Fiction

Head over to Google's homepage on Thursday and you'll enjoy a scrollable comic strip telling the story of Little Red Riding Hood.

Debunker of Doomsday: Nasa Scientist Tries to Talk Some Sense Into the World
From ACM Opinion

Debunker of Doomsday: Nasa Scientist Tries to Talk Some Sense Into the World

Swirling with lunacy and paranoia, the theories warn of mayhem and cataclysm.

'the Idea We Live in a Simulation Isn't Science Fiction'
From ACM Opinion

'the Idea We Live in a Simulation Isn't Science Fiction'

If the universe is just a Matrix-like simulation, how could we ever know? Physicist Silas Beane thinks he has the answer.

Building My Own Laptop
From ACM Opinion

Building My Own Laptop

We are building an open laptop, with some wacky features in it for hackers like me.

How Hackers Exploit 'the Seven Deadly Sins'
From ACM Opinion

How Hackers Exploit 'the Seven Deadly Sins'

This isn't the high tech wizardry of Hollywood but is a good, old-fashioned confidence trick.

How Google Is Taking the Knowledge Graph Global
From ACM News

How Google Is Taking the Knowledge Graph Global

Earlier this month, Google shared a fascinating statistic. The number of items in the company's Knowledge Graph—its database of people, places, and things, and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account