acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

How Big Data Algorithms See ­s—while They Eat ­S ­p
From ACM Opinion

How Big Data Algorithms See ­s—while They Eat ­S ­p

Four years ago I interviewed Sam Yagan, then CEO of OKCupid, about the mathematics underlying his free matchmaking site.

The Adultery Arms Race
From ACM Opinion

The Adultery Arms Race

Jay's wife, Ann, was supposed to be out of town on business.

The August Smart Lock Shows Why You Should Stick With Dumb Keys
From ACM Opinion

The August Smart Lock Shows Why You Should Stick With Dumb Keys

You almost certainly don't need a digital smart lock for your front door.

Why Germans Are Afraid of Google
From ACM Opinion

Why Germans Are Afraid of Google

These days Germany is known for being many things: a leader in clean technology, a manufacturing powerhouse, Europe's foreign policy center.

Google's Schmidt Fires Back Over Encryption
From ACM Opinion

Google's Schmidt Fires Back Over Encryption

To hear Google Inc. Executive Chairman Eric Schmidt tell it, the U.S. government has only itself to blame for new efforts by Google and Apple Inc. to keep police...

The Nsa and Me
From ACM Opinion

The Nsa and Me

The tone of the answering machine message was routine, like a reminder for a dental appointment. But there was also an undercurrent of urgency.

How The Cold War And George Orwell Helped Make The Internet What It Is
From ACM Opinion

How The Cold War And George Orwell Helped Make The Internet What It Is

The story of how the digital age came to be involves a cast of more than 40 people, ranging from a 19th century English countess to California hippies.

Every Computer System Can Be Compromised
From ACM Opinion

Every Computer System Can Be Compromised

Unfortunately, there are many risks inherent in online banking and debit cards.

We Want Privacy, but Can't Stop Sharing
From ACM Opinion

We Want Privacy, but Can't Stop Sharing

Imagine a world suddenly devoid of doors.

Cyber Spy High: Meet the Nsa's Hacker Recruiter
From ACM Opinion

Cyber Spy High: Meet the Nsa's Hacker Recruiter

The National Security Agency has a recruiting problem.

The Toughest Case: What If Osama Bin Laden Had an Iphone?
From ACM Opinion

The Toughest Case: What If Osama Bin Laden Had an Iphone?

In rebuking Apple and Google for their new smartphone encryption polices on Thursday, FBI Director James B. Comey became the latest law enforcement official to...

When Everything Works Like Your Cell Phone
From ACM Opinion

When Everything Works Like Your Cell Phone

Everyone understands what it means to own a plunger.

A Turing Tale
From Communications of the ACM

A Turing Tale

Assessing the accuracy of popular descriptions of Alan Turing's influences and legacy.

Disrupting and Transforming the -University
From Communications of the ACM

Disrupting and Transforming the -University

Higher education institutions must modify their business models in response to technology-driven influences.

Vendor: Vidi, Vici
From Communications of the ACM

Vendor: Vidi, Vici

Some hidden costs of outsourcing.

Outsourcing Responsibility
From Communications of the ACM

Outsourcing Responsibility

What do you do when your debugger fails you?

Risks and Myths of Cloud Computing and Cloud Storage
From Communications of the ACM

Risks and Myths of Cloud Computing and Cloud Storage

Considering existing and new types of risks inherent in cloud services.

The Bitcoin Ecosystem
From Communications of the ACM

The Bitcoin Ecosystem

Speculating on how the Bitcoin economy might evolve.

Soft Infrastructure Challenges to Scientific Knowledge Discovery
From Communications of the ACM

Soft Infrastructure Challenges to Scientific Knowledge Discovery

Seeking to overcome nontechnical challenges to the scientific enterprise.

Exploratory Engineering in Artificial Intelligence
From Communications of the ACM

Exploratory Engineering in Artificial Intelligence

Using theoretical models to plan for AI safety.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account