The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.
The size and scope of cybersecurity needs to account for the integration of information technology into everything, says Robert Brammer with the Northrop Grumman Cybersecurity Research Consortium in an interview.
The United States may seriously want to consider creating a new Internet infrastructure to reduce the threat of cyberattacks, said Michael Hayden, President George W. Bush's CIA director.
The history of Internet security is both worrisome and instructive. When the first virus — the "Morris worm"—was launched in 1988, the Internet was a closed system of 60,000 computers used almost exclusively by academic, government…
British tabloid News of the World said it is closing down over a phone hacking scandal in which workers for the Rupert Murdoch-owned newspaper allegedly snooped on voice mail messages left on the mobile phones of murder victims…
The Supreme Court ended its term with a high-profile ruling that violent video games are protected by the First Amendment, but a bigger technology decision could be looming. The court agreed to hear a case next term about…
In April 1981, the National Aeronautics and Space Administration launched a space shuttle program meant to take astronauts, cargo, research experiments and military equipment into low Earth orbit. The shuttle mission, called…
Research In Motion (RIM), makers of the venerable BlackBerry devices, will always be remembered as the company that liberated corporate email from the PC. In fact, you could make a compelling case that the first BlackBerrys…
When the Walt Disney Company bought Pixar Animation Studios for $7.4 billion in 2006, there was understandable concern that the media conglomerate that drove the famed Disney animation unit into the ground with duds like "Home…
In an interview, Swedish programmers Jon Aslund and Karl Wiberg say they created the Shakespeare Programming Language in one night while they were studying at the Royal Institute of Technology in Stockholm.
Thirty years ago, Andy Hertzfeld was a young computer engineer working at Apple Computer on the first Macintosh under the leadership of Steve Jobs. As Jobs had repeatedly promised the small team, their creation would change…
Forty years ago, I wrote an article for Technology Review titled "Shall We Build the Space Shuttle?" Now, with the 135th and final flight of the shuttle at hand, and the benefit of hindsight, it seems appropriate to ask a…
For more than 20 years, the U.S. Air Force had a world monopoly on radar-evading technology—and with it, a huge advantage over any rival. Several generations of stealth fighters and bombers, from the earliest F-117s to the…
It was early May when LulzSec's profile skyrocketed after a hack on the giant Sony corporation. LulzSec's name comes from Lulz, a corruption of LOL, often denoting laughter at the victim of a prank. For 50 days until it disbanded…
A professor of digital humanities at Dartmouth College, Mary Flanagan has spent her career thinking critically about a topic that most of us take for granted: Play.
Reinstituting formalities — notice of copyright claims and registration requirements — could help address problems related to too many copyrights that last for too many years.
Focusing on socio-technical design with values as a critical component in the design process.
Viewing computer science in a broader context to dispel common misperceptions and provide more accurate guidance to students who are deliberating its study.
Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards. Yet we do not know enough about how profits are…
Addressing the challenges of increasing the number of women of color in computing and ensuring their success.