acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Toward More Secure Software
From Communications of the ACM

Toward More Secure Software

Two proposals intended to reduce flaws in software use two very different approaches for software security.

Why Some of Google's Coolest Projects Flop Badly
From ACM Opinion

Why Some of Google's Coolest Projects Flop Badly

In public, companies try to trot out any hint of a success story—real or imagined. At SXSW this week, Google took a different tack: It talked all about its failures...

Dj Patil Talks Nerdy to ­S
From ACM Opinion

Dj Patil Talks Nerdy to ­S

DJ Patil was recently named the White House's deputy chief technology officer for data policy and chief data scientist, making him the first-ever national datacoined...

Edward Snowden Issues 'call to Arms' For Tech Companies in Secret Sxsw Meeting
From ACM Opinion

Edward Snowden Issues 'call to Arms' For Tech Companies in Secret Sxsw Meeting

NSA whistleblower Edward Snowden was a highlight of last year's SXSW, where he gave one of his first public speeches. This year, Snowden was back at SXSW—but only...

Love in the Time of Bots
From ACM Opinion

Love in the Time of Bots

Convincing people to have a romantic relationship with a computer might be easier than it sounds.

Don't Want Nsa to Spy on Your Email? 5 Things You Can Do
From ACM Opinion

Don't Want Nsa to Spy on Your Email? 5 Things You Can Do

More than half of Americans are worried about the U.S. government's digital spies prying into their emails, texts, search requests and other online information,...

So Sayeth Google
From ACM Opinion

So Sayeth Google

Search for "vaccines." At least within our filter bubble, the top item in Google's "In the news" section earlier this week was an anti-vax column about the "feds'...

Data and Goliath: Bruce Schneier on the Hidden Battles to Collect Your Data and Control Your World
From ACM Opinion

Data and Goliath: Bruce Schneier on the Hidden Battles to Collect Your Data and Control Your World

The book chronicles how governments and corporation have built an unprecedented surveillance state.

Don't Edit the Human Germ Line
From ACM Opinion

Don't Edit the Human Germ Line

It is thought that studies involving the use of genome-editing tools to modify the DNA of human embryos will be published shortly.

The Disastrous Events That Would Break the Internet
From ACM Opinion

The Disastrous Events That Would Break the Internet

The Internet is unbreakable. At least, we think it is.

The 12 Tech Nuisances That Annoy ­s Most
From ACM Opinion

The 12 Tech Nuisances That Annoy ­s Most

You know those days when your phone battery doesn't even make it to dinner?

Smartphones Set For Large-Scale Health Studies
From ACM Opinion

Smartphones Set For Large-Scale Health Studies

Countless owners of smartphones and wearable devices are already using their devices to track their sleep, exercise, blood pressure and other measures of health...

Here's What Will Truly Change Higher Education: Online Degrees That Are Seen as Official
From ACM Opinion

Here's What Will Truly Change Higher Education: Online Degrees That Are Seen as Official

Three years ago, technology was going to transform higher education. What happened?

Year Zero: Our Life Timelines Begin
From ACM Opinion

Year Zero: Our Life Timelines Begin

In 10 years, every human connected to the Internet will have a timeline.

How to Restore Trust in American Technology
From ACM Opinion

How to Restore Trust in American Technology

Last November in the town of Wuzhen, China hosted its first large international summit on Internet governance and cybersecurity.

There Is Actually One Thing You Can Do to Fight the Surveillance Machine
From ACM Opinion

There Is Actually One Thing You Can Do to Fight the Surveillance Machine

Reading this right now?

Are Your Devices Hardwired For Betrayal?
From ACM Opinion

Are Your Devices Hardwired For Betrayal?

It's an interesting time to be a computer security researcher.

The Easiest Way to Get Hacked: ­se Phone at Phone Show
From ACM Opinion

The Easiest Way to Get Hacked: ­se Phone at Phone Show


After Net Neutrality Vote, an ­ncertain Future For the Internet
From ACM Opinion

After Net Neutrality Vote, an ­ncertain Future For the Internet

Thursday, during a rancorous meeting of the Federal Communications Commission, the agencyvoted 3-2 to impose public utility regulations on Internet access providers...

Why Everyone Was Wrong About Net Neutrality
From ACM Opinion

Why Everyone Was Wrong About Net Neutrality

Today, the Federal Communications Commission, by a vote of three to two, enacted its strongest-ever rules on net neutrality, preserving an open Internet by prohibiting...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account