acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Eye-Tracking Smartphones Have Arrived. What About the Privacy Implications?
From ACM Opinion

Eye-Tracking Smartphones Have Arrived. What About the Privacy Implications?

Last March, I wrote in Slate about eye-tracking, which could allow computers and smartphones of the future to collect information not only about what we read, but...

Google Services Should Not Require Real Names: Vint Cerf
From ACM Opinion

Google Services Should Not Require Real Names: Vint Cerf

In the face of increasing government-led crackdowns on social media, Google Inc. should not force Internet users to reveal their real names for some services, including...

What to Do After You've Been Hacked
From ACM Opinion

What to Do After You've Been Hacked

Evernote became the latest member of the "we’ve been hacked" club. And the thing is, what was once a pretty exclusive club now lets just about everyone in these...

The Dangerous Logic of the Bradley Manning Case
From ACM Opinion

The Dangerous Logic of the Bradley Manning Case

After 1,000 days in pretrial detention, Private Bradley Manning offered a modified guilty plea for passing classified materials to WikiLeaks. But his case is far...

Boing Boing's Cory Doctorow on 'homeland,' Printed Guns, and Heart Hacking
From ACM Opinion

Boing Boing's Cory Doctorow on 'homeland,' Printed Guns, and Heart Hacking

I had the pleasure of spending some time with Cory Doctorow on Feb. 25 at the Jefferson Hotel here in the nation's capital.

How the Cloud and Big Data Might Help Win the Hacker Wars
From ACM Opinion

How the Cloud and Big Data Might Help Win the Hacker Wars

Hewlett-Packard's senior VP and head of its Software Enterprise Security Products, Art Gilliland, is speaking today at the RSA Security conference in San Francisco...

Is It Time To Take Cyborg Rights Seriously? A Q&a With Neil Harbisson.
From ACM Opinion

Is It Time To Take Cyborg Rights Seriously? A Q&a With Neil Harbisson.

Harbisson was born without the ability to see color, but a device he calls his "eyeborg" allows him to now "hear" color.

The Art of Cyberwar
From ACM Opinion

The Art of Cyberwar

The New York Times’ front-page report last week that the Chinese army is hacking into America's most sensitive computer networks from a 12-story building outside...

Why Marissa Mayer's Ban on Remote Working at Yahoo Could Backfire Badly
From ACM Opinion

Why Marissa Mayer's Ban on Remote Working at Yahoo Could Backfire Badly

Not long after her arrival at Yahoo, new CEO Marissa Mayer started handing out carrots to her new employees, including new smartphones, free food, and other Google...

The Ar-15 Is More Than a Gun. It's a Gadget
From ACM Opinion

The Ar-15 Is More Than a Gun. It's a Gadget

I was shaking as I shouldered the rifle and peered through the scope at the small steel target 100 yards downrange.

What China's Hackers Get Wrong About Washington
From ACM Opinion

What China's Hackers Get Wrong About Washington

"Start asking security experts which powerful Washington institutions have been penetrated by Chinese cyberspies," report my colleagues Craig Timberg and Ellen...

How Google Did the Right Thing with the Nascar Crash Video, and Why It Matters
From ACM Opinion

How Google Did the Right Thing with the Nascar Crash Video, and Why It Matters

At a NASCAR event on Saturday, debris created by a serious crash flew into the stands and injured a number of fans.

Calling Out the Robocaller
From ACM Opinion

Calling Out the Robocaller

Last month, the Haggler was sitting at home when the phone rang.

The Mystery of Google Street View's Blurred Brooklyn Brownstone
From ACM Opinion

The Mystery of Google Street View's Blurred Brooklyn Brownstone

We've all had shifty neighbors.

How Secure Is the Papal Election?
From ACM News

How Secure Is the Papal Election?

As the College of Cardinals prepares to elect a new pope, security people like me wonder about the process. How does it work, and just how hard would it be to hack...

The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking
From ACM Opinion

The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking

Like the flap of a butterfly's wings causing a hurricane half a world away, the ripples of unintended consequences from Ron Rosenbaum's "Secrets of the Little Blue...

Private ­.s. Firms Take Major Role Vs. Cyberattacks
From ACM Careers

Private ­.s. Firms Take Major Role Vs. Cyberattacks

When Kevin Mandia, a retired military cybercrime investigator, decided to expose China as a primary threat to U.S. computer networks, he didn't have to consult...

Funding Successful Research
From Communications of the ACM

Funding Successful Research

A proposal for result-based funding for research projects.

Can Computer Professionals and Digital Technology Engineers Help Reduce Gun Violence?
From Communications of the ACM

Can Computer Professionals and Digital Technology Engineers Help Reduce Gun Violence?

Ten idea seeds.

Ethics Viewpoints Efficacies
From Communications of the ACM

Ethics Viewpoints Efficacies

Seeking answers to ethical concerns.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account