The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.
Have the activists behind WikiLeaks—and in particular the Web site's founder, Julian Assange—become intoxicated by their own myth? Two recent events involving the now internationally watched Assange and the Web site seem to…
It's deadly. It's irresponsible. And we've all done it. Before you commute home think about this: Why isn't there a better solution to texting while driving.
Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This doesn't violate your Fourth Amendment rights, because you do not…
Silicon Valley has passed an important milestone that may mark the end of one era and the beginning of another.
Right now, more than 100 foreign intelligence organizations are trying to hack into the digital networks that undergird U.S. military operations. The Pentagon recognizes the catastrophic threat posed by cyberwarfare, and is…
It is fascinating the ways in which the world of computing can be made easier, thus creating opportunity for new complexities—usually in the form of new computing technologies. It's happened with programming languages, software…
There's been quite a bit of head-scratching over Intel's decision to purchase McAfee, but, despite all the breathless talk about mobile security and ARM and virus-fighting processors, the chipmaker's motivations for the purchase…
New York University computer science professor Dennis Shasha thinks the future of computing lies in a synthesis with nature. He believes the next big leap in computing will be machines that are programmed to behave in evolutionary…
The social network's new Places feature will make it more difficult to lie to your friends.
Born when Ross Perot was warning about a giant sucking sound and Bill Clinton was apologizing for pain in his marriage, members of this fall’s entering college class of 2014 have emerged as a post-email generation for whom…
When Silicon Valley misses the mark on a new technology, the problem usually is an issue of timing. It's not what is going to happen, but when it will happen that usually trips up the valley.
Each day we exchange a mess of content through Facebook, Twitter, blogs, discussion boards and other online forums. How are companies and other organizations using that data? Rohini Srihari answers questions about data mining…
Who has the right to decide what information should be kept secret? That's the vexatious question raised by WikiLeaks and its founder Julian Assange, who masterminded the publication of 75,000 classified military documents…
Efforts to protect net neutrality that involve government regulation have always faced one fundamental obstacle: the substantial danger that the regulators will cause more harm than good for the Internet.
The world's largest technology company by revenue and the outfit that birthed Silicon Valley has very suddenly and unexpectedly put out a figurative "help wanted" sign.
This constant stream of stories about artificial intelligence suggests that machines are becoming smart and autonomous, a new form of life, and that we should think of them as fellow creatures instead of as tools. But such…
In a 1963 Supreme Court opinion, Chief Justice Earl Warren observed that "the fantastic advances in the field of electronic communication constitute a great danger to the privacy of the individual." The advances have only…
The alleged Google-Verizon deal that's endangering net neutrality.
There's already debate about whether Wikileaks's release of 92,000 classified documents on the war in Afghanistan was more of a milestone in the annals of national security and the press than the 1971 leak of the Pentagon…
Should Pvt. Bradley Manning, the Army intelligence analyst charged with leaking troves of classified documents to WikiLeaks, be tried for treason? And what about Julian Assange, the founder of WikiLeaks: Should he be locked…
Curiosity is one of those personality traits that gets short scientific shrift. It strikes me as a really important mental habit—how many successful people are utterly incurious?—but it’s also extremely imprecise. What does…
On a recent lazy Saturday morning, my daughter and I lolled on a blanket in our front yard, snacking on apricots, listening to a download of E. B. White reading "The Trumpet of the Swan." Her legs sprawled across mine; the…
Recalling malware milestones.
An assessment of the relative achievements in IT infrastructure, firms, and innovation in China.
The what, the how, and the why of giving an effective presentation.
The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.
The computer science luminary, in one of his last interviews before his death in 2002, reflects on a programmer's life.
Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband adoption; and the debate over network neutrality. Interestingly…
Robotics will inspire dramatic changes in the CS curriculum.