acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Toward More Secure Software
From Communications of the ACM

Toward More Secure Software

Two proposals intended to reduce flaws in software use two very different approaches for software security.

Edward Snowden Issues 'call to Arms' For Tech Companies in Secret Sxsw Meeting
From ACM Opinion

Edward Snowden Issues 'call to Arms' For Tech Companies in Secret Sxsw Meeting

NSA whistleblower Edward Snowden was a highlight of last year's SXSW, where he gave one of his first public speeches. This year, Snowden was back at SXSW—but only...

Don't Want Nsa to Spy on Your Email? 5 Things You Can Do
From ACM Opinion

Don't Want Nsa to Spy on Your Email? 5 Things You Can Do

More than half of Americans are worried about the U.S. government's digital spies prying into their emails, texts, search requests and other online information,...

To Pi and Beyond
From ACM Opinion

To Pi and Beyond

Possibly not everyone knows that March 14th is Pi Day, in honor of the symbol used to denote the ratio of the circumference of a circle to its diameter.

Data and Goliath: Bruce Schneier on the Hidden Battles to Collect Your Data and Control Your World
From ACM Opinion

Data and Goliath: Bruce Schneier on the Hidden Battles to Collect Your Data and Control Your World

The book chronicles how governments and corporation have built an unprecedented surveillance state.

The Disastrous Events That Would Break the Internet
From ACM Opinion

The Disastrous Events That Would Break the Internet

The Internet is unbreakable. At least, we think it is.

The 12 Tech Nuisances That Annoy ­s Most
From ACM Opinion

The 12 Tech Nuisances That Annoy ­s Most

You know those days when your phone battery doesn't even make it to dinner?

Smartphones Set For Large-Scale Health Studies
From ACM Opinion

Smartphones Set For Large-Scale Health Studies

Countless owners of smartphones and wearable devices are already using their devices to track their sleep, exercise, blood pressure and other measures of health...

Year Zero: Our Life Timelines Begin
From ACM Opinion

Year Zero: Our Life Timelines Begin

In 10 years, every human connected to the Internet will have a timeline.

How to Restore Trust in American Technology
From ACM Opinion

How to Restore Trust in American Technology

Last November in the town of Wuzhen, China hosted its first large international summit on Internet governance and cybersecurity.

There Is Actually One Thing You Can Do to Fight the Surveillance Machine
From ACM Opinion

There Is Actually One Thing You Can Do to Fight the Surveillance Machine

Reading this right now?

Are Your Devices Hardwired For Betrayal?
From ACM Opinion

Are Your Devices Hardwired For Betrayal?

It's an interesting time to be a computer security researcher.

The Easiest Way to Get Hacked: ­se Phone at Phone Show
From ACM Opinion

The Easiest Way to Get Hacked: ­se Phone at Phone Show


The World Loves the Smartphone. So How About a Smart Home?
From ACM Opinion

The World Loves the Smartphone. So How About a Smart Home?

My coffee maker is texting me again. It's scheduled to make coffee tomorrow, the message says, but I need to refill its water tank.

Surveillance-Based Manipulation: How Facebook or Google Could Tilt Elections
From ACM Opinion

Surveillance-Based Manipulation: How Facebook or Google Could Tilt Elections

Someone who knows things about us has some measure of control over us, and someone who knows everything about us has a lot of control over us.

Why Did Computer Science Make a Hero Out of Turing?
From Communications of the ACM

Why Did Computer Science Make a Hero Out of Turing?

Comparing the legacy of Alan Turing in computer science with that of Carl Friedrich Gauss in mathematics.

The Real Software Crisis
From Communications of the ACM

The Real Software Crisis: Repeatability as a Core Value

Sharing experiences running artifact evaluation committees for five major conferences.

Humans in Computing
From Communications of the ACM

Humans in Computing: Growing Responsibilities For Researchers

Considering the role of institutional review boards in computing research.

A Technician Shortage
From Communications of the ACM

A Technician Shortage

In our elation about rising CS enrollments, we are overlooking a growing shortage of computing technicians. Our education system is not responding to this need.

Reaching a Broader Population of Students Through 'Unplugged' Activities
From Communications of the ACM

Reaching a Broader Population of Students Through 'Unplugged' Activities

Introducing children to fundamental computing concepts through Computer Science Unplugged.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account