acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Four Technology Fallacies That Need to Die
From ACM Opinion

Four Technology Fallacies That Need to Die

As any historian, psychologist, sociologist, or scientist will tell you, the truth of an idea has very little to do with how fast it spreads and how well it's believed...

The Wrong Way to Treat Child Geniuses
From ACM Opinion

The Wrong Way to Treat Child Geniuses

When I was a child, I was a "genius"—the kind you sometimes see profiled on the local news.

Why Did the Justice Department Indict Five Chinese Military Officers?
From ACM Opinion

Why Did the Justice Department Indict Five Chinese Military Officers?

At first glance, the Justice Department's 31-count indictment of five Chinese military officers for hacking into the computers of six American corporations, in...

China's Cyber-Generals Are Reinventing the Art of War
From ACM Opinion

China's Cyber-Generals Are Reinventing the Art of War

The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization...

How Darpa's Augmented Reality Software Works
From ACM Opinion

How Darpa's Augmented Reality Software Works

Six years ago, the Defense Advanced Research Projects Agency (DARPA) decided that they had a new dream. The agency wanted a system that would overlay digital tactical...

The End Is A.i.: The Singularity Is Sci-Fi's Faith-Based Initiative
From ACM Opinion

The End Is A.i.: The Singularity Is Sci-Fi's Faith-Based Initiative

In 1993, Vernor Vinge wrote a paper about the end of the world.

From ACM Opinion

Time Machines Would Run Afoul of the Second Law of Thermodynamics

We've all seen those movies where someone goes back in time and tries to change something (the classic "Grandfather Paradox": what happens if you go back in time...

Meet the People Behind the Wayback Machine, One of Our Favorite Things About the Internet
From ACM Opinion

Meet the People Behind the Wayback Machine, One of Our Favorite Things About the Internet

Brewster Kahle is quick to point out that we are not standing inside a former Scientology church.

A Summer Reading List For Innovators
From ACM Opinion

A Summer Reading List For Innovators

For this summer's reading list, we bring you seven very different types of books that have been published since the start of the year, each of them exploring the...

How the ­.s. Could Escalate Its Name-and-Shame Campaign Against China's Espionage
From ACM Opinion

How the ­.s. Could Escalate Its Name-and-Shame Campaign Against China's Espionage

Earlier this week the U.S. Department of Justice indicted five Chinese military officers for industrial espionage, accusing them of leading attacks on the computers...

Man Behind the First Computer Password: It's Become a Nightmare
From ACM Opinion

Man Behind the First Computer Password: It's Become a Nightmare

In the early 1960s, Fernando Corbató helped deploy the first known computer password.

Beyond Data and Analysis
From Communications of the ACM

Beyond Data and Analysis

Why business analytics and big data really matter for modern business organizations.

The Logic of Logging
From Communications of the ACM

The Logic of Logging

And the illogic of PDF.

Avalanches Are Coming
From Communications of the ACM

Avalanches Are Coming

Computing technology has generated conditions for radical transformations of jobs and professions — including education. How shall we cope?

FUD
From Communications of the ACM

FUD: A Plea For Intolerance

Relying on dubious claims can cause researchers to focus on the wrong questions and organizations to misdirect security spending.

Owning and Using
From Communications of the ACM

Owning and Using

On vital and supporting systems.

EMV
From Communications of the ACM

EMV: Why Payment Systems Fail

What lessons might we learn from the chip cards used for payments in Europe, now that the U.S. is adopting them too?

Secrets, Lies and Snowden's Email: Why I Was Forced to Shut Down Lavabit
From ACM Opinion

Secrets, Lies and Snowden's Email: Why I Was Forced to Shut Down Lavabit

My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation...

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?
From ACM Opinion

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?

There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose...

The Internet's History Isn’t As "open" As You Think
From ACM Opinion

The Internet's History Isn’t As "open" As You Think

This spring, the Federal Communications Commission is deciding how to regulate the "Open Internet"—a term it uses to refer to the movement for net neutrality.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account