Svoboda | Graniru | BBC Russia | Golosameriki | Facebook

May 2007 - Vol. 50 No. 5

Features

Opinion Editorial pointers

Editorial Pointers

Anniversaries are a time to reflect on past achievements and ponder future goals. On the occasion of ACM’s 50 anniversary in 1997, we recognized the Association’s potential role in steering the next 50 years of computing. Now, as ACM approaches its 60th year, we go back to the beginning and trace those founding days: the […]
Opinion Forum

Forum

In their article "Increased Security Through Open Source" (Jan. 2007), Jaap-Henk Hoepman and Bart Jacobs claimed that open source software will be more secure than closed source. For average users, however, the situation will be the same. They’ll still have to trust some other party to rate the security of the software they use. Whether […]
Opinion President's letter

ACM’s Past Helps Steer its Future

When the Association for Computing Machinery was founded, our name explained what interested us. In the 60 years since then, the Association has embraced systems, software, services, policy, education, the roles of people, as well as other topics relating to information technology. This month’s special section spotlighting the birth of ACM and the pioneering spirits […]
News News track

News Track

Princeton professor Andrew Appel recently purchased five Sequoia e-voting machines from a government auction site for $82; now he and his students are dissecting the machines to determine just how tamper-proof they really are. Wired reports the team is reverse engineering the software embedded in the machines’ ROM chips to check for security holes. Appel […]
Opinion Hot links

Top 10 Downloads from ACM’s Digital Library

Communications of the ACM Volume 50, Number 5 (2007), Pages 124-125 Hot links: Top 10 downloads from ACM’s digital library Diane Crawford Table of Contents Tables Back to Top Tables Table.Top 10 Downloads from ACM’s Digital Library Table.The Top 10 Most Popular Papers from ACM’s Refereed Journals and Conference Proceedings Downloaded in February 2007 Table.The […]
Opinion Inside risks

The Psychology of Security

The information security literature is filled with risk pathologies, heuristics that we use to help us evaluate risks. I’ve collected them from many different sources. When you look over the list of exaggerated and downplayed risks in the table here, the most remarkable thing is how reasonable so many of them seem. This makes sense […]

Recent Issues

  1. August 2024 CACM cover
    August 2024 Vol. 67 No. 8
  2. July 2024 CACM cover
    July 2024 Vol. 67 No. 7
  3. June 2024 Vol. 67 No. 6
  4. May 2024 CACM cover
    May 2024 Vol. 67 No. 5