From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
In his 2008 white paper that first proposed bitcoin, the anonymous Satoshi Nakamoto concluded with: "We have proposed a system for electronic transactions without...Wired From ACM Opinion | February 7, 2019
The average person would have to spend 76 working days reading all of the digital privacy policies they agree to in the span of a year. Reading Amazon's terms and...The New York Times From ACM Opinion | February 7, 2019
From 550 feet in the air, Google's Scott Huffman peers down at the Las Vegas skyline. It's a sunny afternoon in early January and, at the moment, Google owns this...CNET From ACM Opinion | February 6, 2019
Blockchain technology isn't as widely used as it could be, largely because blockchain users don't trust each other, as research shows.
The Conversation From ACM Opinion | February 5, 2019
Considering the expression "computational thinking" as an entry point to understand why the fundamental contribution of computing to science is the shift from solving...Enrico Nardelli From Communications of the ACM | February 1, 2019
Carnegie Mellon University's successful efforts enrolling, sustaining, and graduating women in computer science challenge the belief in a gender divide in CS education...Carol Frieze, Jeria L. Quesenberry From Communications of the ACM | February 1, 2019
Retracing the pivotal privacy and security-related events and ensuing issues from the past year.
Carl Landwehr From Communications of the ACM | February 1, 2019
Former Trump advisor and self-proclaimed "dirty trickster" Roger Stone—the man with a Richard Nixon tattoo on his back and a penchant for playing the evil genius—was...Ars Technica From ACM Opinion | January 28, 2019
We're living through the most profound transformation in our information environment since Johannes Gutenberg's invention of printing in circa 1439.
The Guardian From ACM Opinion | January 22, 2019
Last year was full of cybersecurity disasters, from the revelation of security flaws in billions of microchips to massive data breaches and attacks using malicious...Technology Review From ACM Opinion | January 16, 2019
As Americans increasingly buy and install smart devices in their homes, all those cheap interconnected devices create new security problems for individuals and...The Conversation From ACM Opinion | January 14, 2019
How do New York Times journalists use technology in their jobs and in their personal lives? Li Yuan, a technology columnist in Hong Kong, discussed the tech she's...The New York Times From ACM Opinion | January 11, 2019
Late one Wednesday in March 2015, an alarm sounded in the offices of GitHub, a San Francisco-based software firm. The company's offices exemplified the kind of...Technology Review From ACM Opinion | January 10, 2019
As the new Congress begins, it will soon discuss the comprehensive reports to the U.S. Senate on the disinformation campaign of half-truths, outright fabrications...The Conversation From ACM News | January 9, 2019
Once it was fashionable to fret about the prospect of super-intelligent machines taking over the world. The past year showed that AI may cause all sorts of hazards...Technology Review From ACM Opinion | January 8, 2019
A despairing prediction for the digital future came from an unlikely source recently. Speaking of "deepfakes," or media manipulated through artificial intelligence...The Washington Post From ACM Opinion | January 7, 2019
Born in Beijing and educated at Harvard, Yasheng Huang, a professor at MIT's Sloan School of Management, is a keen observer of China's entrepreneurial efforts and...Technology Review From ACM Opinion | January 2, 2019
Cybersecurity researchers and analysts are rightly worried that a new type of computer, based on quantum physics rather than more standard electronics, could ...The Conversation From ACM Opinion | December 28, 2018
Imagine American politics for a moment as a laboratory experiment. A foreign adversary (let's call it "Russia") begins to play with the subjects, using carrots...The Washington Post From ACM Opinion | December 28, 2018
Personal technology was so awful this year that nobody would think you were paranoid if you dug a hole and buried your computer, phone and smart speaker under six...The New York Times From ACM Opinion | December 26, 2018