Examining the structure of the enterprise attack surface in view of the relative ease with which cyberdefenses can be subverted.
Gaurav Banga From Communications of the ACM | April 1, 2020
Considering the implications of the influence of artificial intelligence given previous industrial revolutions.
Mari Sako From Communications of the ACM | April 1, 2020
These canaries in the coal mines of AI would be signs that superintelligent robot overlords are approaching.
Technology Review From ACM Opinion | February 25, 2020
Considering the merits of several models and approaches to Internet governance.
Kieron O'Hara, Wendy Hall From Communications of the ACM | March 1, 2020
Considering the far-reaching and fundamental implications of computing beyond digital computers.
Omer Reingold From Communications of the ACM | March 1, 2020
Culturally responsive computing repurposes computer science education by making it meaningful to not only students, but also to their families and communities.
...Michael Lachney, Aman Yadav From Communications of the ACM | March 1, 2020
A pervasive belief in software engineering is that some programmers are much better than others, and that their skills, abilities, and talents exert an outsized...Carnegie Mellon University From ACM Opinion | February 4, 2020
Students should interact with one another to practice skills and construct their own understanding, with assistance from a teacher acting as a coach and guide —...Clif Kussmaul From Communications of the ACM | February 1, 2020
Estimating when the second half of the world will come online.
Carlos Iglesias, Dhanaraj Thakur, Michael L. Best From Communications of the ACM | February 1, 2020
Incorporating considerations of reasonable pluralism, individual agency, and legitimate authority.
Johannes Himmelreich From Communications of the ACM | January 1, 2020
Evaluating the arguments for and against using digital data derived from security breaches.
David M. Douglas From Communications of the ACM | December 1, 2019