acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

The Greatest Bond Villain of All: Technology
From ACM Opinion

The Greatest Bond Villain of All: Technology

Tech has always played a prominent role in the Bond franchise; it's a key element of the plot formula: Bond opens with a chase scene, the core mission is revealed...

Long Day For a Professor Who Puts Elections ­nder a Microscope
From ACM Opinion

Long Day For a Professor Who Puts Elections ­nder a Microscope

Monday afternoon, just half a day before the polls opened, Prof. Mark Crispin Miller was feeling pessimistic about the electoral process.

Security Experts Push Back at 'Cyber Pearl Harbor' Warning
From ACM TechNews

Security Experts Push Back at 'Cyber Pearl Harbor' Warning

Security experts are pushing back against what they see as alarmist rhetoric from U.S. Department of Homeland Security secretary Janet Napolitano and Department...

From ACM Opinion

A Sample Security Agenda For Obama's Second Term

When Barack Obama was sworn in four years ago for his first term, there was genuine optimism that he would make meaningful improvements to the security of the nation's...

How to Devise Passwords That Drive Hackers Away
From ACM Opinion

How to Devise Passwords That Drive Hackers Away

Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self.

Killing the Computer to Save It
From ACM Opinion

Killing the Computer to Save It

Many people cite Albert Einstein's aphorism "Everything should be made as simple as possible, but no simpler." Only a handful, however, have had the opportunity...

The Michigan Fight Song and Four Other Reasons to Avoid Internet Voting
From ACM Opinion

The Michigan Fight Song and Four Other Reasons to Avoid Internet Voting

In a Monday article, we described the security and reliability problems that have undermined public confidence in electronic voting machines within the United States...

Cybercrime: Mobile Changes Everything—and No One's Safe
From ACM Opinion

Cybercrime: Mobile Changes Everything—and No One's Safe

The FBI recently put out a mobile malware alert, providing us with a sobering reminder of this "evil software" for phones and tablets.

Keeping Technology Promises
From Communications of the ACM

Keeping Technology Promises

Considering new models for educational technology and methods.

Societal Implications of the Emerging Smart Grid
From Communications of the ACM

Societal Implications of the Emerging Smart Grid

Seeking solutions to concerns that go beyond the engineering of the smart grid.

Learning to Teach Computer Science
From Communications of the ACM

Learning to Teach Computer Science: The Need For a Methods Course

A multipronged approach to preparing computer science teachers is critical to success.

Decentralization Versus Centralization in IT Governance
From Communications of the ACM

Decentralization Versus Centralization in IT Governance

It's not as simple as you might think.

Oracle v. Google
From Communications of the ACM

Oracle v. Google: Are APIs Copyrightable?

Assessing the first phase of the trial based on claims that Google's Android platform infringes Oracle's Java-related copyrights and patents.

The Research Value of Publishing Attacks
From Communications of the ACM

The Research Value of Publishing Attacks

Security research can be improved by more effectively sharing what is learned from attacks on information systems.

DARPA-Funded Radio Hackrf Aims to Be a $300 Wireless Swiss Army Knife For Hackers
From ACM Opinion

DARPA-Funded Radio Hackrf Aims to Be a $300 Wireless Swiss Army Knife For Hackers

Since the days of Alan Turing, the promise of a digital computer has been that of a universal machine, one that can be a word processor one minute and a robot brain...

Capitol Hill Rhetoric Takes Aim at Wrong Cybersecurity Targets
From ACM Opinion

Capitol Hill Rhetoric Takes Aim at Wrong Cybersecurity Targets

Defense secretary Leon Panetta couldn't resist, could he? He couldn't fight the urge to dig deep into the information security cliché handbook and yank out that...

In Constant Digital Contact, We Feel 'alone Together'
From ACM Opinion

In Constant Digital Contact, We Feel 'alone Together'

As soon as Sherry Turkle arrived at the studio for her Fresh Air interview, she realized she'd forgotten her phone.

And the Firewalls Came Tumbling Down
From ACM Opinion

And the Firewalls Came Tumbling Down

There's much to like about "This Machine Kills Secrets," Andy Greenberg's well-reported history of WikiLeaks and the many projects it has inspired, but one unintentionally...

Craig Venter Imagines a World with Printable Life Forms
From ACM Opinion

Craig Venter Imagines a World with Printable Life Forms

Craig Venter imagines a future where you can download software, print a vaccine, inject it, and presto! Contagion averted.

Jack Dorsey: Leadership Secrets Of Twitter And Square
From ACM Careers

Jack Dorsey: Leadership Secrets Of Twitter And Square

You cover a lot of ground hanging out with Jack Dorsey.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account