acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

New Exemptions to Anti-Circumvention Rules
From Communications of the ACM

New Exemptions to Anti-Circumvention Rules

Allowing some reverse engineering of technical measures for non-infringing purposes.

Telegraph to the Iphone: A Short History of Corporate Defiance
From ACM Opinion

Telegraph to the Iphone: A Short History of Corporate Defiance

The high-stakes stalemate between Apple and the Justice Department isn’t the first time that Washington and Silicon Valley have come to a showdown over security...

Apple's Fbi Battle Is Complicated. Here's What's Really Going On
From ACM News

Apple's Fbi Battle Is Complicated. Here's What's Really Going On

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and...

The Apple Fight Isn't About Encryption
From ACM Opinion

The Apple Fight Isn't About Encryption

The most striking aspect of Apple's message to customers on Tuesday wasn't the rejection of U.S. authorities' demand that the company help them break the encryption...

Eff to Support Apple in Encryption Battle
From ACM Opinion

Eff to Support Apple in Encryption Battle

We learned on Tuesday evening that a U.S. federal magistrate judge ordered Apple to backdoor an iPhone that was used by one of the perpetrators of the San Bernardino...

Is D-Wave's Quantum Processor Really 10⁸ Times Faster Than a Normal Computer?
From ACM Opinion

Is D-Wave's Quantum Processor Really 10⁸ Times Faster Than a Normal Computer?

We have been following D-Wave's claims about its quantum hardware at Ars for a number of years. Over that time, my impression has oscillated between skepticism,...

Having a Conversation About Bulk Surveillance
From Communications of the ACM

Having a Conversation About Bulk Surveillance

Considering a controversial subject that extends far beyond the collection of phone metadata.

Lessons from the Tech Transfer Trenches
From Communications of the ACM

Lessons from the Tech Transfer Trenches

Moving from the research realm to real-world business application.

Code Hoarding
From Communications of the ACM

Code Hoarding

Committing to commits, and the beauty of summarizing graphs.

Broadening Access to Computing Education State By State
From Communications of the ACM

Broadening Access to Computing Education State By State

Influencing computer science education at the state level.

Privacy Research Directions
From Communications of the ACM

Privacy Research Directions

What must we learn in order to support privacy requirements as technology advances?

Tech's 'frightful 5' Will Dominate Digital Life For Foreseeable Future
From ACM Opinion

Tech's 'frightful 5' Will Dominate Digital Life For Foreseeable Future

There's a little parlor game that people in Silicon Valley like to play. Let's call it, Who's Losing?

Wikipedia Turns 15
From ACM Opinion

Wikipedia Turns 15

It must be difficult for the roughly half a billion people who visit Wikipedia every month to remember a world without the free online encyclopedia.

Space Mining Could Set Off a Star War
From ACM Opinion

Space Mining Could Set Off a Star War

Space is lousy with profits.

Why Knowledge Representation Matters
From Communications of the ACM

Why Knowledge Representation Matters

A personal story: From philosophy to software.

Unbalanced Data Leads to Obsolete Economic Advice
From Communications of the ACM

Unbalanced Data Leads to Obsolete Economic Advice

Few computer scientists and technological workers worry about their role in the economies of their industries and their countries. Background supplementary material...

Where Code Comes From
From Communications of the ACM

Where Code Comes From: Architectures of Automatic Control from Babbage to Algol

Considering the evolving concept of programming.

The Chaos Machine
From Communications of the ACM

The Chaos Machine

Complexity, predictability, and modern projects.

Extrapolating from Moore's Law
From Communications of the ACM

Extrapolating from Moore's Law

Behind and beyond Microsoft, Intel, and Apple.

Biometric Identity
From Communications of the ACM

Biometric Identity

Assessing the promises and dangers of biometric identity plans.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account