acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Lessons from the Tech Transfer Trenches
From Communications of the ACM

Lessons from the Tech Transfer Trenches

Moving from the research realm to real-world business application.

Code Hoarding
From Communications of the ACM

Code Hoarding

Committing to commits, and the beauty of summarizing graphs.

Broadening Access to Computing Education State By State
From Communications of the ACM

Broadening Access to Computing Education State By State

Influencing computer science education at the state level.

Privacy Research Directions
From Communications of the ACM

Privacy Research Directions

What must we learn in order to support privacy requirements as technology advances?

The Case For Looking to the States, Not the Federal Government, to Protect Your Privacy
From ACM Opinion

The Case For Looking to the States, Not the Federal Government, to Protect Your Privacy

A year ago, President Obama stood behind a podium at the Federal Trade Commission and called for legislation that would set a single national standard for when...

The Long and Winding History of Encryption
From ACM Opinion

The Long and Winding History of Encryption

Never in history have more people had access to advanced encryption in their homes, offices, and pockets.

Wikipedia Turns 15
From ACM Opinion

Wikipedia Turns 15

It must be difficult for the roughly half a billion people who visit Wikipedia every month to remember a world without the free online encyclopedia.

What Makes a 'smart Gun' Smart?
From ACM Opinion

What Makes a 'smart Gun' Smart?

Every time a toddler accidentally shoots a friend or family member, a teen kills himself via gunshot or a shooter perpetrates an act of mass violence, public discussion...

Why It's So Hard For Washington to Draft Tech Companies Against the Islamic State
From ACM Opinion

Why It's So Hard For Washington to Draft Tech Companies Against the Islamic State

Here's the basic problem the government faces when it comes to stopping the Islamic State's Internet propaganda: It needs Silicon Valley's help. But some tech companies—even...

Max Levchin Wants to School Lawmakers on Encryption
From ACM Opinion

Max Levchin Wants to School Lawmakers on Encryption

PayPal Inc. co-founder Max Levchin wants to make sure lawmakers know "what the hell they're talking about" when they talk about encryption.

In 2016, Terror Suspects and 7-Eleven Thieves May Bring Surveillance to Supreme Court
From ACM Opinion

In 2016, Terror Suspects and 7-Eleven Thieves May Bring Surveillance to Supreme Court

It has now been 2.5 years since the first Snowden revelations were published. And in 2015, government surveillance marched on in both large (the National Security...

In 2015, Promising Surveillance Cases Ran Into Legal Brick Walls
From ACM Opinion

In 2015, Promising Surveillance Cases Ran Into Legal Brick Walls

Today, the first Snowden disclosures in 2013 feel like a distant memory.

Security's Biggest Winners and Losers in 2015
From ACM Opinion

Security's Biggest Winners and Losers in 2015

This year, lawmakers surprised us by taking initial steps—albeit, baby ones—to rein in some of the NSA's mass spying and provide better oversight of the intelligence...

Learning to Apply Data Science to Business Problems
From ACM Opinion

Learning to Apply Data Science to Business Problems

One of the most exciting parts of data science is that it can be applied to many domains of knowledge, given our newfound ability to gather valuable data on almost...

The Dark Side of the Coming Chatbot Revolution
From ACM Opinion

The Dark Side of the Coming Chatbot Revolution

Artificial intelligence is coming to a messaging app near you.

The Cybersecurity Argument For and Against Device Encryption
From ACM Opinion

The Cybersecurity Argument For and Against Device Encryption

Government officials argue that encrypted communication poses national security risks. But tech companies say that making it possible to unlock devices would make...

How the Internet of Things Limits Consumer Choice
From ACM Opinion

How the Internet of Things Limits Consumer Choice

In theory, the Internet of Things—the connected network of tiny computers inside home appliances, household objects, even clothing—promises to make your life easier...

Why Knowledge Representation Matters
From Communications of the ACM

Why Knowledge Representation Matters

A personal story: From philosophy to software.

Unbalanced Data Leads to Obsolete Economic Advice
From Communications of the ACM

Unbalanced Data Leads to Obsolete Economic Advice

Few computer scientists and technological workers worry about their role in the economies of their industries and their countries. Background supplementary material...

Where Code Comes From
From Communications of the ACM

Where Code Comes From: Architectures of Automatic Control from Babbage to Algol

Considering the evolving concept of programming.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account