acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Why We Need a Standard for the Internet of Things
From ACM Opinion

Why We Need a Standard for the Internet of Things

The Internet of things is supposed to connect every aspect of our lives from our homes and cars to the objects we wear and the goods we consume. It's even connecting...

The Sun Shines on 'the Cloud'
From ACM Opinion

The Sun Shines on 'the Cloud'

What's the real lesson to be learned from Amazon's cloud computing failure two weeks ago, the one that knocked Netflix and other Websites offline?

Google Shaman Explains Mysteries of 'compute Engine'
From ACM News

Google Shaman Explains Mysteries of 'compute Engine'

Google started work on the Google Compute Engine over a year and a half ago, and it was all Peter Magnusson could do to keep his mouth shut.

Is ­.s. Government Reading Email Without a Warrant?
From ACM News

Is ­.s. Government Reading Email Without a Warrant?

Does the U.S. government read your email? It's a simple question, but apparently there's no simple answer. And the Justice Department and the Internal Revenue Service...

From ACM Opinion

Are Guidelines Issued By Drone Industry an Attempt to Avoid Government Regulation?

The growing use of drones in the United States is facing firm opposition from civil liberties groups and some legislators, like Sen. Rand Paul, R-Ky., and Rep. ...

How to Break Into Security, Schneier Edition
From ACM Careers

How to Break Into Security, Schneier Edition

I asked noted cryptographer, author and security rock star Bruce Schneier for his thoughts. Schneier: I regularly receive email from people who want advice on how...

A Weapon We Can't Control
From ACM Opinion

A Weapon We Can't Control

The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush's presidency...

Why Faces Matter to Facebook
From ACM Opinion

Why Faces Matter to Facebook

Facebook really wants to know what you look like.

The Challenges of Privacy By Design
From Communications of the ACM

The Challenges of Privacy By Design

Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense challenges, including management...

Google's Hybrid Approach to Research
From Communications of the ACM

Google's Hybrid Approach to Research

By closely connecting research and development Google is able to conduct experiments on an unprecedented scale, often resulting in new capabilities for the company...

Alan Turing's Other Universal Machine
From Communications of the ACM

Alan Turing's Other Universal Machine

All computer scientists know about the Universal Turing Machine, one of the foundation stones of theoretical computer science. Much less well known is the practical...

An Information Strategy For Environmental Sustainability
From Communications of the ACM

An Information Strategy For Environmental Sustainability

Many proposed solutions to the species-threatening transformations born of human industrialization have an engineering orientation. Often the suggested remedies...

Can Online Piracy Be Stopped By Laws?
From Communications of the ACM

Can Online Piracy Be Stopped By Laws?

Considering the legal responsibilities of Internet intermediaries in the aftermath of the Stop Online Privacy Act controversy.

Business Models For Strategy and Innovation
From Communications of the ACM

Business Models For Strategy and Innovation

While often ambiguously defined, business models are central to innovation.

How Flame Virus Has Changed Everything For Online Security Firms
From ACM Opinion

How Flame Virus Has Changed Everything For Online Security Firms

Here's a question: if you connect an unprotected Windows computer to the Internet, how long will it take before it is infected by malicious software?

What Have We Learned: Flame Malware
From ACM Opinion

What Have We Learned: Flame Malware

When the news about the Flame malware first broke several weeks ago, people from all parts of the security community, political world and elsewhere quickly began...

The Vulnerabilities Market and the Future of Security
From ACM Opinion

The Vulnerabilities Market and the Future of Security

Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...

What Facebook Knows
From ACM News

What Facebook Knows

If Facebook were a country, a conceit that founder Mark Zuckerberg has entertained in public, its 900 million members would make it the third largest in the world...

World's Largest Organization For Computer Professionals Comes Out Against Cispa
From ACM Opinion

World's Largest Organization For Computer Professionals Comes Out Against Cispa

The U.S. Public Policy Council of the Association of Computing Machinery, representing ACM, came out against CISPA, the cybersecurity legislation recently passed...

Analyzing the Cybersecurity Threat Posed By Hackers
From ACM TechNews

Analyzing the Cybersecurity Threat Posed By Hackers

In an interview, Northeastern University professor Themis Papa­george discusses the cybersecurity threat presented by rogue hacker groups such as Anonymous, and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account