acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Y2k 2.0: Is the ­.s. Government Set to 'give Away the Internet' Saturday?
From ACM Opinion

Y2k 2.0: Is the ­.s. Government Set to 'give Away the Internet' Saturday?

Remember the projected Y2K bug disaster? The world's computers would supposedly go haywire as the clock ticked to January 1, 2000, thus destroying the world and...

Online Trackers Follow Our Digital Shadow By 'fingerprinting' Browsers, Devices
From ACM Opinion

Online Trackers Follow Our Digital Shadow By 'fingerprinting' Browsers, Devices

As we surf from website to website, we are being tracked—that's not news. What is news, revealed in a recent paper by researchers at Princeton University, is that...

Grading the Presidential Candidates on Science
From ACM Opinion

Grading the Presidential Candidates on Science

Two weeks ago, Scientific American asked for your help in grading the presidential candidates on their answers to 20 questions about various aspects of scientific...

The Internet Is No Place For Public Elections
From ACM Opinion

The Internet Is No Place For Public Elections

Despite what your local election officials may tell you, you can’t trust the Internet with your vote.

Ted Cruz Is Wrong About How Free Speech Is Censored on the Internet
From ACM Opinion

Ted Cruz Is Wrong About How Free Speech Is Censored on the Internet

Sen. Ted Cruz wants to engineer a United States takeover of a key Internet organization, ICANN, in the name of protecting freedom of expression.

Universities and Computer Science in the European Crisis of Refugees
From Communications of the ACM

Universities and Computer Science in the European Crisis of Refugees

Considering the role of universities in promoting tolerance as well as education.

Mobile Computing and Political Transformation
From Communications of the ACM

Mobile Computing and Political Transformation

Connecting increased mobile phone usage with political and market liberalization.

The Puzzle of Japanese Innovation and Entrepreneurship
From Communications of the ACM

The Puzzle of Japanese Innovation and Entrepreneurship

Exploring how Japan's unique mixture of social, educational, and corporate practices influence entrepreneurial activity.

For the Debaters: What Shall We Do About the Tech Careening Our Way?
From ACM Opinion

For the Debaters: What Shall We Do About the Tech Careening Our Way?

Here's a question I’m hoping comes up at Monday's presidential debate: Secretary Clinton and Mr. Trump, what would you do about self-driving trucks?

The Cold War Is Over. The Cyber War Has Begun.
From ACM Opinion

The Cold War Is Over. The Cyber War Has Begun.

Contemplating Russian nuclear threats during the Cold War, the strategist Herman Kahn calibrated a macabre ladder of escalation, with 44 rungs ranging from "Ostensible...

'just Because We Can With Data, Doesn't Mean We Should'
From ACM Opinion

'just Because We Can With Data, Doesn't Mean We Should'

Data scientists should have a strong moral compass in order to handle big data, according to DJ Patil, deputy chief technology officer for data policy and chief...

The Leaky Myths of Snowden
From ACM Opinion

The Leaky Myths of Snowden

Oliver Stone's Snowden is a bad movie, stuffed with myth, short on drama.

Neither Hillary Clinton Nor Donald Trump Is Tech Savvy
From ACM Opinion

Neither Hillary Clinton Nor Donald Trump Is Tech Savvy

Rachel Law, the 20-something co-founder of a New York startup called Kip, is sitting next to me at a café, tapping her phone screen to show how the company’s service...

Why Scientists Must Share Their Research Code
From ACM Opinion

Why Scientists Must Share Their Research Code

Many scientists worry over the reproducibility of wet-lab experiments, but data scientist Victoria Stodden's focus is on how to validate computational research:...

The Feds Will Soon Be Able to Legally Hack Almost Anyone
From ACM Opinion

The Feds Will Soon Be Able to Legally Hack Almost Anyone

Digital devices and software programs are complicated. Behind the pointing and clicking on screen are thousands of processes and routines that make everything work...

How Long ­ntil Hackers Start Faking Leaked Documents?
From ACM Opinion

How Long ­ntil Hackers Start Faking Leaked Documents?

In the past few years, the devastating effects of hackers breaking into an organization's network, stealing confidential data, and publishing everything have been...

Microsoft's Top Lawyer Becomes a Civil Rights Crusader
From ACM Opinion

Microsoft's Top Lawyer Becomes a Civil Rights Crusader

When Apple CEO Tim Cook refused to help the FBI get into a mass murderer's iPhone last winter, he was hailed for his boldness in fighting the government on ...

Paperless Voting Could Fuel 'rigged' Election Claims
From ACM Opinion

Paperless Voting Could Fuel 'rigged' Election Claims

Voters in four competitive states will cast ballots in November on electronic machines that leave no paper trail—a lapse that threatens to sow distrust about a...

The Do-Not-Call List Has a Gaping Hole
From ACM Opinion

The Do-Not-Call List Has a Gaping Hole

Sure, legitimate telemarketers will refrain from calling you if you've put your phone number on it. But criminal telephone spammers will call you anyway because...

Before Apple And Facebook, There Was Something More Revolutionary
From ACM Opinion

Before Apple And Facebook, There Was Something More Revolutionary

It's easy to think that the modern era in communication began in the 1990s with the birth of the Internet.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account