The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.
It's time to reverse the trend of centralized information technology that has been the hallmark of most companies for at least 10 years. Control of IT shouldn't rest with the IT staff.
Horse bettor John Astarita have plenty of explanations why horse racing revenue is on the decline. One complaint concerns deep-pocket investors who use computer programs to track historical race information, wagering millions…
In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services, Sony has beefed up security—a tacit admission it could have…
Some of the folks responsible for developing and promoting the technologies that have undermined the U.S. Postal Service are banding together in an attempt to save the nation's mail-delivery service. They will meet atPostalVision…
Continuous integration and an automated asset pipeline should guarantee that you can produce an up-to-date working version of the game you are working on in very little time. But a collection of things can go wrong when you…
Reuse, recycle, repurpose, renewables. This past Earth Day, we heard a lot about these concepts. As important as they are, I've noticed one phrase missing from the vernacular: Power management.
It's time for a major change in the way our personal, private data is handled. We need to take back our data from companies that are unwilling and unable to protect it.
As U.S. special forces assaulted Osama bin Laden's walled compound in Pakistan, a Twitter user was already recording a rough outline of the events to come. Sohaib Athar, who describes himself as a 33-year-old programmer and …
Microsoft researcher Gordon Bell, paperless for more than a decade, envisions data centers saturated with information and services readily available via the Internet.
WikiLeaks founder Julian Assange called Facebook "the most appalling spying machine ever invented" in an interview with Russia Today, pointing to the popular social networking site as one of the top tools for the U.S. to spy…
To the catalog of corporate "bigs" that worry a lot of us little people, add this: Big Data.
No sooner had President Obama released his long-form birth certificate than Orly Taitz, the doyenne of the "birther" movement, found reason to doubt it.
The decision to drop terror chieftain Osama bin Laden’s corpse into the Arabian Sea was the final meticulous step in a raid whose details were calculated to exert deadly force but also to achieve maximum effect in the propaganda…
In a comprehensive Q&A, Peter Denning, the editor-in-chief of Ubiquity, offers his thoughts on the future of computer science and discusses the art of making predictions about the future.
Studying how privacy regulation might impact economic activity on the advertising-supported Internet.
Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.
Steve Furber, designer of the seminal BBC Microcomputer System and the widely used ARM microprocessor, reflects on his career.
In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was an engineer at Bell Labs, and his invention was,…
Highlighting the significance of the often overlooked underlying software used to produce research results.