The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.
The Pentagon looks defenseless against cyberwarfare.
In a garage in Palo Alto, Calif., in the 1980s, some friends and I were the first humans to experience becoming avatars—that is, movable representations of ourselves in cyberspace. Amazingly, all these years later, almost…
Five years ago, having only recently arrived at the company, I wrote The Internet Services Disruption in order to kick off a major change management process across the company. In the opening section of that memo, I noted…
Uefa president Michel Platini believes goal-line technology would lead to "Playstation football."
During a visit to MIT, Arun Majumdar, director of the U.S. Department of Energy’s Advanced Research Projects Agency–Energy (ARPA-E), discussed the global energy challenge and the role his agency plays in trying to foster transformational…
Microsoft researchers Andy Wilson and Hrvoje Benko have developed LightSpace, a project that uses an array of projectors and depth-sensing cameras to sense human forms and enable users to move two-dimensional digital objects…
Patrick Gorman, former associate director of the U.S. Office of the Director of National Intelligence, says the United States should apply the lessons of the space race to the investment of educating and training a cohort of…
Larry and Sergey founded Google because they wanted to help solve really big problems using technology. And one of the big problems we’re working on today is car safety and efficiency. Our goal is to help prevent traffic accidents…
"In the 1960s I think that in some sense the present was actually about three or four years long," he said, "because in three or four years relatively little would change."
Research suggests that the approach that worked with a few large companies with aligned interests needs revisiting in the Internet age.
Talking to a computer security researcher about Stuxnet is like asking an art critic to describe the finer points of the Mona Lisa. The world's top cybersecurity minds are absolutely in awe.
The saga of Steven P. Jobs is so well known that it has entered the nation’s mythology: he’s the prodigal who returned to Apple in 1997, righted a listing ship and built it into one of the most valuable companies in the world…
Everything in our three-dimensional world has a width, length and height. That was what we thought, at least. But this picture overlooks a whole class of materials: crystals one atom or molecule thick, essentially two-dimensional…
In an increasingly digital world, ironically, there may yet be a silver lining to the primitive nature of India's infrastructure: that it is not computer-controlled may make India less vulnerable than some other nations. Cyber…
"The Social Network" is wonderful entertainment, but its message is actually kind of evil.
Combining new consumer devices and Internet platforms with online services and content is proving to be a successful strategy.
Adapting agile software development methodology toward more efficient management of academic research groups.
The Victorian world was awash with data and with organizations that processed it; and they usually used nothing more technologically advanced than pen and paper.
An illustration of the problems caused by a lack of discipline in software development and our failure to apply what is known in the field.
The way you number your releases communicates more than you might think.