acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Will Facebook's Robot Censors Know Porn When They See It?
From ACM Opinion

Will Facebook's Robot Censors Know Porn When They See It?

The old trope about pornography is that you’ll know it when you see it. Facebook is betting that not only will it know it, but that the social network will be able...

'maker Movement' Taps Deep and Rich Tradition
From ACM Opinion

'maker Movement' Taps Deep and Rich Tradition

Sometimes I worry we're becoming a culture of technology consumers, instead of creators.

Software Recognition Technology Is Amazing, but Not Amazing Enough
From ACM Opinion

Software Recognition Technology Is Amazing, but Not Amazing Enough

The gadget blogs may work themselves into a frenzy over megapixels and processor speed. But if you want to know what really dazzles the masses, consider a feature...

From ACM Opinion

Snowden, Through the Eyes of a Spy Novelist

For a spy novelist like me, the Edward J. Snowden story has everything. A man driven by ego and idealism—can anyone ever distinguish the two?—leaves his job and...

Ways to Make Your Online Tracks Harder to Follow
From ACM Opinion

Ways to Make Your Online Tracks Harder to Follow


Could Artificial Intelligence Create an Unemployment Crisis?
From Communications of the ACM

Could Artificial Intelligence Create an Unemployment Crisis?

Advances in artificial intelligence and robotics will have significant implications for evolving economic systems.

Toward Culturally Responsive Computing Education
From Communications of the ACM

Toward Culturally Responsive Computing Education

Improving academic success and social development by merging computational thinking with cultural practices.

The Business of Professionals
From Communications of the ACM

The Business of Professionals

Expertise and service ethics are just two of the many components comprising a modern professional.

Information and Communication Technology For Managing Supply Chain Risks
From Communications of the ACM

Information and Communication Technology For Managing Supply Chain Risks

How to encourage ethical behavior among all links in a global supply chain.

Statutory Damages As a Threat to Innovation
From Communications of the ACM

Statutory Damages As a Threat to Innovation

Considering the negative influence of U.S. statutory damage rules on technology innovation.

Sorry, It's Not 1984
From ACM Opinion

Sorry, It's Not 1984

After leaker Edward Snowden revealed the existence of massive domestic-surveillance programs operated by the NSA, the airwaves were clotted with pundits and politicians...

Qr Codes Aren't Dead Yet
From ACM Opinion

Qr Codes Aren't Dead Yet

My favorite mobile device isn't my phone, my iPad, or my car. It's my Canon digital SLR camera.

Phew, Nsa Is Just Collecting Metadata. (you Should Still Worry)
From ACM Opinion

Phew, Nsa Is Just Collecting Metadata. (you Should Still Worry)

We now know that every day, U.S. phone companies quietly send the government a list of who called whom and when—"telephony metadata"—for every call made on their...

Google's Chief Legal Officer: Eight Things We Learned
From ACM Opinion

Google's Chief Legal Officer: Eight Things We Learned

David Drummond, Google's senior vice president of corporate development and chief legal officer, took part in a live Q&A on Wednesday to answer questions about...

The German Prism: Berlin Wants to Spy Too
From ACM Opinion

The German Prism: Berlin Wants to Spy Too

Just a few days ago, the man whom many Germans now see as one of the greatest villains in the world visited Berlin.

Tech Moves to the Background as Design Becomes Foremost
From ACM Opinion

Tech Moves to the Background as Design Becomes Foremost

In the last few decades, the computing industry has passed through several different eras.

The Prism
From ACM Opinion

The Prism

An extraordinary fuss about eavesdropping started in the spring of 1844, when Giuseppe Mazzini, an Italian exile in London, became convinced that the British government...

Will the Nsa Rethink Its Data Collection System?
From ACM Opinion

Will the Nsa Rethink Its Data Collection System?

Weekend Edition Sunday Host Rachel Martin talks to Joel Brenner, former senior counsel at the National Security Agency, about whether the NSA can protect Americans'...

From ACM Opinion

Microsoft's ­.s. Law Enforcement and National Security Requests For Last Half of 2012

This afternoon we are publishing additional information about the volume of law enforcement and national security orders served on Microsoft. For the first time...

Connecting the Dots on Prism, Phone Surveillance, and the Nsa's Massive Spy Center
From ACM Opinion

Connecting the Dots on Prism, Phone Surveillance, and the Nsa's Massive Spy Center

Physically, the NSA has always been well protected by miles of high fences and electrified wire, thousands of cameras, and gun-toting guards.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account