acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Convicted By Code
From ACM Opinion

Convicted By Code

Secret code is everywhere—in elevators, airplanes, medical devices.

The Social Security Number's Insecurities
From ACM Opinion

The Social Security Number's Insecurities

In both the Anthem insurance hack and the two Office of Personnel Management hacks this year, attackers gained access to Social Security numbers, affecting 80 million...

Is Star Trek Tech Possible?
From ACM Opinion

Is Star Trek Tech Possible?

My friend Veronica Belmont is pretty cool. Nerd, writer, TV host… and now she’s doing an online video series with Engadget called "Dear Veronica," where she answers...

Meet the Bots
From ACM Opinion

Meet the Bots

The day that science fiction writers have feared for so long has finally come—the machines have risen up.

Why Mlb Fans Should Lament the Failure of Google Glass
From ACM Opinion

Why Mlb Fans Should Lament the Failure of Google Glass

The consumer tech world received a jolt in January when the Wall Street Journal reported that Google executives were freezing all sales of its futuristically goofy...

So Sayeth Google
From ACM Opinion

So Sayeth Google

Search for "vaccines." At least within our filter bubble, the top item in Google's "In the news" section earlier this week was an anti-vax column about the "feds'...

How to Fight the Next $1 Billion Bank Hack
From ACM Opinion

How to Fight the Next $1 Billion Bank Hack

Good news! A major hack you don't have to worry about! Unless, that is, you happen to be an executive or security employee at one of the hundreds of banks targeted...

William Gibson Sees the Future
From ACM Opinion

William Gibson Sees the Future

"The thing to keep in mind," William Gibson tells me when we meet in the quiet lounge of a Victorian-style hotel in Chicago, "is that I’m not actually predicting...

Dumbing It Down in the Cockpit
From ACM Opinion

Dumbing It Down in the Cockpit

Long gone are the leather jackets, goggles, and silk scarves flung over the shoulders of aviators who wrestled with flight controls, furiously scanned instruments...

You Should Be Terrified of Superintelligent Machines
From ACM Opinion

You Should Be Terrified of Superintelligent Machines

In the recent discussion over the risks of developing superintelligent machines—that is, machines with general intelligence greater than that of humans—two narratives...

Singularity or Transhumanism: What Word Should We ­se to Discuss the Future?
From ACM Opinion

Singularity or Transhumanism: What Word Should We ­se to Discuss the Future?

Singularity. Posthuman. Techno-Optimism, Cyborgism. Humanity+. Immortalist. Machine intelligence. Biohacker. Robotopia. Life extension. Transhumanism.

Coder's High
From ACM Opinion

Coder's High

These days I write more than I code, but one of the things I miss about programming is the coder's high: those times when, for hours on end, I would lock my vision...

The Internet's History Isn’t As "open" As You Think
From ACM Opinion

The Internet's History Isn’t As "open" As You Think

This spring, the Federal Communications Commission is deciding how to regulate the "Open Internet"—a term it uses to refer to the movement for net neutrality.

I Didn't Type This Article
From ACM Opinion

I Didn't Type This Article

I'm dictating it to my iPhone as I walk down the busy city street on the way to my office in the West Village.

Can We Really ­pload Johnny Depp's Brain?
From ACM Opinion

Can We Really ­pload Johnny Depp's Brain?

When Wally Pfister's Transcendence is released on April 17, millions of moviegoers will be asking themselves, "Could we really upload Johnny Depp into a computer...

The Lewis Effect
From ACM Opinion

The Lewis Effect

Michael Lewis couldn't have timed it better if he'd tried.

What Do Data Brokers Know About Me?
From ACM Opinion

What Do Data Brokers Know About Me?

I once ran into a friend and her husband at the playground in our neighborhood in Manhattan.

The Weirdest Thing About the Apple Security Bug Is How Simple It Was
From ACM Opinion

The Weirdest Thing About the Apple Security Bug Is How Simple It Was

So for the past 18 months, there has been a horrific security hole in many of Apple's products that has allowed "man in the middle" attacks on supposedly secure...

Why Watson Is Real Artificial Intelligence
From ACM Opinion

Why Watson Is Real Artificial Intelligence

Artificial intelligence is here now.

Let the Nsa Keep Hold of the Data
From ACM Opinion

Let the Nsa Keep Hold of the Data

One of the recommendations by the president's Review Group on Intelligence and Communications Technologies on reforming the National Security Agency—No. 5, if you're...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account