acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

This Sci-Fi Author Thinks Amazon Will Cause an Apocalypse
From ACM Opinion

This Sci-Fi Author Thinks Amazon Will Cause an Apocalypse

Charles Stross is an award-winning science fiction author whose books include The Bloodline Feud, about timeline-hopping narco-terrorists, Halting State, a near...

Security Secrets, Dated but Real
From ACM Opinion

Security Secrets, Dated but Real

Was the National Cryptologic Museum designed using a code of some kind?

The Nsa's Cyber-King Goes Corporate
From ACM Opinion

The Nsa's Cyber-King Goes Corporate

Keith Alexander, the recently retired director of the National Security Agency, left many in Washington slack-jawed when it was reported that he might charge companies...

The Weird Reasons Why People Make ­p False Identities on the Internet
From ACM Opinion

The Weird Reasons Why People Make ­p False Identities on the Internet

Sockpuppetry—using false identities for deception—is centuries old, but the advent of the web has made creating sockpuppets, and falling for their tricks, easier...

How to Invent a Person Online
From ACM Opinion

How to Invent a Person Online

On April 8, 2013, I received an envelope in the mail from a nonexistent return address in Toledo, Ohio.

How the ­.s. Stumbled Into the Drone Era
From ACM Opinion

How the ­.s. Stumbled Into the Drone Era

On Sept. 7, 2000, in the waning days of the Clinton administration, a U.S. Predator drone flew over Afghanistan for the first time.

How to Talk About Blowing Things ­p in Cyberspace, According to the Military
From ACM Opinion

How to Talk About Blowing Things ­p in Cyberspace, According to the Military

Bombs are relatively simple, when you boil everything down.

Researching the Robot Revolution
From Communications of the ACM

Researching the Robot Revolution

Considering a program for cross-disciplinary research between computer scientists and economists studying the effects of computers on work.

From Communications of the ACM

Forked Over

Shortchanged by open source.

Private Then Shared?
From Communications of the ACM

Private Then Shared?

Designing for the mobile phone to shared PC pipeline.

Fostering Computational Literacy in Science Classrooms
From Communications of the ACM

Fostering Computational Literacy in Science Classrooms

An agent-based approach to integrating computing in secondary-school science courses.

Can You Engineer Privacy?
From Communications of the ACM

Can You Engineer Privacy?

The challenges and potential approaches to applying privacy research in engineering practice.

Bletchley Park's Rebirth and Why It Matters
From ACM Opinion

Bletchley Park's Rebirth and Why It Matters

Twenty five years ago, the historic World War II codebreaking center Bletchley Park faced demolition.

Calling All Hackers: Help ­S Build an Open Wireless Router
From ACM Opinion

Calling All Hackers: Help ­S Build an Open Wireless Router

EFF is releasing an experimental hacker alpha release of wireless router software specifically designed to support secure, shareable Open Wireless networks.

The Moral Hazards and Legal Conundrums of Our Robot-Filled Future
From ACM Opinion

The Moral Hazards and Legal Conundrums of Our Robot-Filled Future

The robots are coming, and they're getting smarter.

Nsa Implementing Fix to Prevent Snowden-Like Security Breach
From ACM Opinion

Nsa Implementing Fix to Prevent Snowden-Like Security Breach

A year after Edward Snowden's digital heist, the NSA's chief technology officer says steps have been taken to stop future incidents. But he says there's no way...

The Hazards of Probing the Internet's Dark Side
From ACM Opinion

The Hazards of Probing the Internet's Dark Side

Late last year, hackers breached Target's data security and stole information from millions of credit cards.

Seeker, Doer, Giver, Ponderer
From ACM Opinion

Seeker, Doer, Giver, Ponderer

James H. Simons likes to play against type.

7 Things You Should Know About Tor
From ACM Opinion

7 Things You Should Know About Tor

We posted last week about the Tor Challenge and why everyone should use Tor.

Should Facebook Manipulate ­sers?
From ACM Opinion

Should Facebook Manipulate ­sers?

Should we worry that technology companies can secretly influence our emotions?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account