acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Why Google Glass Is the Next Frontier For Developers
From ACM Opinion

Why Google Glass Is the Next Frontier For Developers

When Google co-founder Sergey Brin demoed Google Glass, the search giant's attempt to build a next-generation wearable computer, with skydivers live streaming their...

How to Break Into Security, Schneier Edition
From ACM Careers

How to Break Into Security, Schneier Edition

I asked noted cryptographer, author and security rock star Bruce Schneier for his thoughts. Schneier: I regularly receive email from people who want advice on how...

From ACM Opinion

Why Learn C?

Though C has been around for decades, it's still consistently ranked at the top of any list of programming languages used and studied today.  

The Challenges of Privacy By Design
From Communications of the ACM

The Challenges of Privacy By Design

Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense challenges, including management...

Google's Hybrid Approach to Research
From Communications of the ACM

Google's Hybrid Approach to Research

By closely connecting research and development Google is able to conduct experiments on an unprecedented scale, often resulting in new capabilities for the company...

Alan Turing's Other Universal Machine
From Communications of the ACM

Alan Turing's Other Universal Machine

All computer scientists know about the Universal Turing Machine, one of the foundation stones of theoretical computer science. Much less well known is the practical...

An Information Strategy For Environmental Sustainability
From Communications of the ACM

An Information Strategy For Environmental Sustainability

Many proposed solutions to the species-threatening transformations born of human industrialization have an engineering orientation. Often the suggested remedies...

Can Online Piracy Be Stopped By Laws?
From Communications of the ACM

Can Online Piracy Be Stopped By Laws?

Considering the legal responsibilities of Internet intermediaries in the aftermath of the Stop Online Privacy Act controversy.

Business Models For Strategy and Innovation
From Communications of the ACM

Business Models For Strategy and Innovation

While often ambiguously defined, business models are central to innovation.

Alan Turing: Why the Tech World's Hero Should Be a Household Name
From ACM Opinion

Alan Turing: Why the Tech World's Hero Should Be a Household Name

I've worked in computing, and more specifically computer networking, nearly all my life. It's an industry in a constant state of innovation, always pushing beyond...

Economist Paul Krugman Is a Hard-Core Science Fiction Fan
From ACM Opinion

Economist Paul Krugman Is a Hard-Core Science Fiction Fan

If you follow the news at all, you've probably seen Paul Krugman—Princeton professor, New York Times columnist, Nobel Prize-winning economist—championing the idea...

How To Fix the Gender Gap in Technology
From ACM Opinion

How To Fix the Gender Gap in Technology

The United States has produced viable female presidential candidates, women athletes who command millions of dollars in endorsements, and the first female Nobel...

Are We Living in Bradbury's Fahrenheit 451?
From ACM Opinion

Are We Living in Bradbury's Fahrenheit 451?

Science-fiction author Ray Bradbury, one of the world's leading writers of the genre for more than 60 years, died on Wednesday at the age of 91. Although he wrote...

Can America Ever Have Another 'sputnik Moment'?
From ACM Opinion

Can America Ever Have Another 'sputnik Moment'?

In his 2011 State of the Union Address, President Obama declared, "This is our generation's Sputnik moment." Sputnik was the satellite that the Soviets had launched...

A Measure of Control
From Communications of the ACM

A Measure of Control

Some limitations on measurements in software.

The Cybersecurity Risk
From Communications of the ACM

The Cybersecurity Risk

Increased attention to cybersecurity has not resulted in improved cybersecurity.

Scale Failure
From Communications of the ACM

Scale Failure

Using a tool for the wrong job is OK until the day when it isn't.

Security of the Internet and the Known Unknowns
From Communications of the ACM

Security of the Internet and the Known Unknowns

Seeking answers to questions about Internet vulnerabilities.

The Myth of the Elevator Pitch
From Communications of the ACM

The Myth of the Elevator Pitch

Instead of pitching, listen and offer.

Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security Policy
From Communications of the ACM

Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security Policy

Cybersecurity and policy issues for computer scientists.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account