acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Google Is Listening
From ACM Opinion

Google Is Listening

You know the cliché that if you're not paying for the product, you are the product?

Would It Be Ethical to Implant False Memories in Therapy?
From ACM Opinion

Would It Be Ethical to Implant False Memories in Therapy?

Take a moment to remember an event that you experienced as a child.

The Problem With Google's 'star Trek' Computer
From ACM Opinion

The Problem With Google's 'star Trek' Computer

Google is hoping to develop its Assistant, a Siri-like technology to be included on the company's new smartphones and other products, into something like the computer...

Why Data Is the New Coal
From ACM Opinion

Why Data Is the New Coal

"Is data the new oil?" asked proponents of big data back in 2012 in Forbes magazine. By 2016, and the rise of big data's turbo-powered cousin deep learning, westated Fortune...

Online Trackers Follow Our Digital Shadow By 'fingerprinting' Browsers, Devices
From ACM Opinion

Online Trackers Follow Our Digital Shadow By 'fingerprinting' Browsers, Devices

As we surf from website to website, we are being tracked—that's not news. What is news, revealed in a recent paper by researchers at Princeton University, is that...

The Internet Is No Place For Public Elections
From ACM Opinion

The Internet Is No Place For Public Elections

Despite what your local election officials may tell you, you can’t trust the Internet with your vote.

Ted Cruz Is Wrong About How Free Speech Is Censored on the Internet
From ACM Opinion

Ted Cruz Is Wrong About How Free Speech Is Censored on the Internet

Sen. Ted Cruz wants to engineer a United States takeover of a key Internet organization, ICANN, in the name of protecting freedom of expression.

Universities and Computer Science in the European Crisis of Refugees
From Communications of the ACM

Universities and Computer Science in the European Crisis of Refugees

Considering the role of universities in promoting tolerance as well as education.

Risks of Automation
From Communications of the ACM

Risks of Automation: A Cautionary Total-System Perspective of Our Cyberfuture

Where automation is inevitable, let's do it right.

Mobile Computing and Political Transformation
From Communications of the ACM

Mobile Computing and Political Transformation

Connecting increased mobile phone usage with political and market liberalization.

The Puzzle of Japanese Innovation and Entrepreneurship
From Communications of the ACM

The Puzzle of Japanese Innovation and Entrepreneurship

Exploring how Japan's unique mixture of social, educational, and corporate practices influence entrepreneurial activity.

The Cold War Is Over. The Cyber War Has Begun.
From ACM Opinion

The Cold War Is Over. The Cyber War Has Begun.

Contemplating Russian nuclear threats during the Cold War, the strategist Herman Kahn calibrated a macabre ladder of escalation, with 44 rungs ranging from "Ostensible...

Big Step For Quantum Teleportation Won't Bring ­S Any Closer to Star Trek. Here's Why
From ACM Opinion

Big Step For Quantum Teleportation Won't Bring ­S Any Closer to Star Trek. Here's Why

Two teams have set new distance records for quantum teleportation: using the weirdness of quantum mechanics to instantly transfer the condition or "state" of one...

The Leaky Myths of Snowden
From ACM Opinion

The Leaky Myths of Snowden

Oliver Stone's Snowden is a bad movie, stuffed with myth, short on drama.

Neither Hillary Clinton Nor Donald Trump Is Tech Savvy
From ACM Opinion

Neither Hillary Clinton Nor Donald Trump Is Tech Savvy

Rachel Law, the 20-something co-founder of a New York startup called Kip, is sitting next to me at a café, tapping her phone screen to show how the company’s service...

The Feds Will Soon Be Able to Legally Hack Almost Anyone
From ACM Opinion

The Feds Will Soon Be Able to Legally Hack Almost Anyone

Digital devices and software programs are complicated. Behind the pointing and clicking on screen are thousands of processes and routines that make everything work...

How Long ­ntil Hackers Start Faking Leaked Documents?
From ACM Opinion

How Long ­ntil Hackers Start Faking Leaked Documents?

In the past few years, the devastating effects of hackers breaking into an organization's network, stealing confidential data, and publishing everything have been...

Microsoft's Top Lawyer Becomes a Civil Rights Crusader
From ACM Opinion

Microsoft's Top Lawyer Becomes a Civil Rights Crusader

When Apple CEO Tim Cook refused to help the FBI get into a mass murderer's iPhone last winter, he was hailed for his boldness in fighting the government on ...

Paperless Voting Could Fuel 'rigged' Election Claims
From ACM Opinion

Paperless Voting Could Fuel 'rigged' Election Claims

Voters in four competitive states will cast ballots in November on electronic machines that leave no paper trail—a lapse that threatens to sow distrust about a...

The Do-Not-Call List Has a Gaping Hole
From ACM Opinion

The Do-Not-Call List Has a Gaping Hole

Sure, legitimate telemarketers will refrain from calling you if you've put your phone number on it. But criminal telephone spammers will call you anyway because...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account