acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Security Guru Pledges to Strengthen Critical Computers
From ACM Opinion

Security Guru Pledges to Strengthen Critical Computers

Stuxnet, a piece of malicious software discovered in 2010, targeted industrial software controlling Iran’s uranium-enrichment centrifuges. But the code got loose—and...

Alan Turing Remembered
From Communications of the ACM

Alan Turing Remembered

A unique firsthand account of formative experiences with Alan Turing.

Why We Need an ACM Special Interest Group For Broadening Participation
From Communications of the ACM

Why We Need an ACM Special Interest Group For Broadening Participation

A proposal for an international group focused on broadening participation.

Moods
From Communications of the ACM

Moods

Recognizing and working with moods — your own, your team's, and your customers' — is essential to professional success.

Can More Code Mean Fewer Bugs?
From Communications of the ACM

Can More Code Mean Fewer Bugs?

The bytes you save today may bite you tomorrow.

Saving Private Gromit
From Communications of the ACM

Saving Private Gromit

Reflections on the legalities and economics of preserving animations and games in Europe.

IT Innovation For the Bottom of the Pyramid
From Communications of the ACM

IT Innovation For the Bottom of the Pyramid

New ways to develop technologies for the emerging growth markets.

The Real Threat to Internet Freedom Isn't the ­nited Nations
From ACM Opinion

The Real Threat to Internet Freedom Isn't the ­nited Nations

The Internet is often seen as a place of chaos and disorder, a borderless world in which anonymous trolls roam free and vigilante hackers wreak havoc.

Silicon Valley Must Stop U.N. from Regulating the Internet
From ACM Opinion

Silicon Valley Must Stop U.N. from Regulating the Internet

The notion of the United Nations making the rules and governing the Internet should send shivers down the spine of anyone who uses a cell phone, laptop or search...

Moral Machines
From ACM Opinion

Moral Machines

Google's driver-less cars are already street-legal in three states, California, Florida, and Nevada, and some day similar devices may not just be possible but mandatory...

How Far Away Is Mind-Machine Integration?
From ACM Opinion

How Far Away Is Mind-Machine Integration?

Okay, great: we can control our phones with speech recognition and our television sets with gesture recognition.

From ACM Opinion

Clear Need to Define Cyberweapons and Cyberwar

The term cyberwar has become a catch-all used by politicians, talking heads and others to encompass just about any online threat, regardless of the attacker or...

Kill the Password: Why a String of Characters Can't Protect ­S Anymore
From ACM Opinion

Kill the Password: Why a String of Characters Can't Protect ­S Anymore

You have a secret that can ruin your life.

From ACM Opinion

Was Petraeus Borked?

In 1987, when Judge Robert Bork was enmeshed in a partisan struggle over his Supreme Court nomination, a reporter for an alternative weekly in Washington, D.C.,...

Instead of 'dead Dropping,' Petraeus and Broadwell Should Have ­sed These Email Security Tricks
From ACM Opinion

Instead of 'dead Dropping,' Petraeus and Broadwell Should Have ­sed These Email Security Tricks

Having an extramarital affair in 2012 is not an easy task if you’re the chief of the world’s most renowned spy agency.

The Greatest Bond Villain of All: Technology
From ACM Opinion

The Greatest Bond Villain of All: Technology

Tech has always played a prominent role in the Bond franchise; it's a key element of the plot formula: Bond opens with a chase scene, the core mission is revealed...

Long Day For a Professor Who Puts Elections ­nder a Microscope
From ACM Opinion

Long Day For a Professor Who Puts Elections ­nder a Microscope

Monday afternoon, just half a day before the polls opened, Prof. Mark Crispin Miller was feeling pessimistic about the electoral process.

Security Experts Push Back at 'Cyber Pearl Harbor' Warning
From ACM TechNews

Security Experts Push Back at 'Cyber Pearl Harbor' Warning

Security experts are pushing back against what they see as alarmist rhetoric from U.S. Department of Homeland Security secretary Janet Napolitano and Department...

From ACM Opinion

A Sample Security Agenda For Obama's Second Term

When Barack Obama was sworn in four years ago for his first term, there was genuine optimism that he would make meaningful improvements to the security of the nation's...

How to Devise Passwords That Drive Hackers Away
From ACM Opinion

How to Devise Passwords That Drive Hackers Away

Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account