acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Training Users vs. Training Soldiers
From Communications of the ACM

Training Users vs. Training Soldiers: Experiences from the Battlefield

How military training methods can be applied to more effectively teach computer users.

The Idea Idea
From Communications of the ACM

The Idea Idea

What if practices rather than ideas are the main source of innovation?

Do Software Copyrights Protect What Programs Do?
From Communications of the ACM

Do Software Copyrights Protect What Programs Do?

A case before the European Court of Justice has significant implications for innovation and competition in the software industry.

War 2.0: Cyberweapons and Ethics
From Communications of the ACM

War 2.0: Cyberweapons and Ethics

Considering the basic ethical questions that must be resolved in the new realm of cyberwarfare.

From ACM Opinion

The Internet Is Broken; We Need to Start Over

Last year, the level and ferocity of cyberattacks on the Internet reached such a horrendous level that some are now thinking the unthinkable: let the Internet wither...

A High-Tech War on Leaks
From ACM Opinion

A High-Tech War on Leaks

Back in 2006, before the Obama administration made leak prosecutions routine, a panel of three federal appeals court judges in New York struggled to decide whether...

Rudy Rucker: 'all These Years, and I'm Still Looking For the Big Aha'
From ACM Opinion

Rudy Rucker: 'all These Years, and I'm Still Looking For the Big Aha'

"When I see an old movie, like from the '40s or '50s or '60s, the people look so calm. They don't have smart phones, they're not looking at computer screens, they're...

The Mathematical Equation that Caused the Banks to Crash
From ACM Opinion

The Mathematical Equation that Caused the Banks to Crash

It was the holy grail of investors. The Black-Scholes equation, brainchild of economists Fischer Black and Myron Scholes, provided a rational way to price a financial...

Cyberwar Is the New Yellowcake, Fueling a Cybersecurity-Industrial Complex
From ACM Opinion

Cyberwar Is the New Yellowcake, Fueling a Cybersecurity-Industrial Complex

In last month's State of the Union address, President Obama called on Congress to pass "legislation that will secure our country from the growing dangers of cyber...

From ACM Opinion

A Cyber Risk to the ­.s.

In a recent briefing to Congress about worldwide threats, FBI Director Robert S. Mueller III said that the danger of cyberattacks will equal or surpass the danger...

From ACM Opinion

Tides Are Changing For Web Surfers

David Weinberger has a new book out entitled Too Big to Know in which he argues that one of the implications of a comprehensively networked society is that the...

Erasing the Boundaries
From ACM Opinion

Erasing the Boundaries

Technology used to be so simple.

Are Supercomputers Worth Their Super Price Tags?
From ACM Opinion

Are Supercomputers Worth Their Super Price Tags?

"Why do we have to aim for the world's No. 1 — what's wrong with being the world's No. 2?" That short question about Japan's vaunted K supercomputer program has...

Google Knows Too Much About You
From ACM Opinion

Google Knows Too Much About You

If you use Google, and I know you do, you may have noticed a little banner popping up at the top of the page announcing: "We're changing our privacy policy and...

Why William Gibson Distrusts Aging Futurists' Nostalgia
From ACM Opinion

Why William Gibson Distrusts Aging Futurists' Nostalgia

Few things seem more pathetic than a science fiction writer who pines for the "good old days." 

From ACM Opinion

The Science Fiction Effect

It's alive! Neurophysiology. Huddled around a warm fireplace one cold summer's night in 1816, a small group of friends decided to hold a competition to see who...

Five Reasons The Robo-Car Haters Are Wrong
From ACM Opinion

Five Reasons The Robo-Car Haters Are Wrong

The self-driving cars we’ve been promised since the dawn of the auto age are here.

A Discussion With David Farber: Bandwidth, Cyber Security, and the Obsolescence of the Internet
From ACM TechNews

A Discussion With David Farber: Bandwidth, Cyber Security, and the Obsolescence of the Internet

Internet technology veteran David Farber projects that within a decade, computers will be outfitted with optical connections rather than pins for networking, and...

From ACM Opinion

Privacy, Technology, and Law

Every day, those of us who live in the digital world give little bits of ourselves away. On Facebook and LinkedIn. To servers that store our email, Google searches...

From ACM Opinion

How to Tackle Cybersecurity

There is a right way and a wrong way to address cybersecurity.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account