acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Robots: Can We Trust Them with Our Privacy?
From ACM Opinion

Robots: Can We Trust Them with Our Privacy?

Joss Wright is training a robot to freak people out.

Imposing Security
From ACM Opinion

Imposing Security

Three computer bugs this year exposed passwords, e-mails, financial data, and other kinds of sensitive information connected to potentially billions of people.

How the Nsa Could Bug Your Powered-Off Phone, and How to Stop Them
From ACM Opinion

How the Nsa Could Bug Your Powered-Off Phone, and How to Stop Them

Just because you turned off your phone doesn't mean the NSA isn't using it to spy on you.

How to Make Robots Seem Less Creepy
From ACM Opinion

How to Make Robots Seem Less Creepy

Robots may be poised to enter a new frontier in the workplace—but that doesn't mean the public is ready for it.

Ray Kurzweil
From ACM Opinion

Ray Kurzweil

Ray Kurzweil is teaching computers how to read better—one more step in the march of technological progress.

China's Cyber-Generals Are Reinventing the Art of War
From ACM Opinion

China's Cyber-Generals Are Reinventing the Art of War

The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization...

How Darpa's Augmented Reality Software Works
From ACM Opinion

How Darpa's Augmented Reality Software Works

Six years ago, the Defense Advanced Research Projects Agency (DARPA) decided that they had a new dream. The agency wanted a system that would overlay digital tactical...

The End Is A.i.: The Singularity Is Sci-Fi's Faith-Based Initiative
From ACM Opinion

The End Is A.i.: The Singularity Is Sci-Fi's Faith-Based Initiative

In 1993, Vernor Vinge wrote a paper about the end of the world.

How the ­.s. Could Escalate Its Name-and-Shame Campaign Against China's Espionage
From ACM Opinion

How the ­.s. Could Escalate Its Name-and-Shame Campaign Against China's Espionage

Earlier this week the U.S. Department of Justice indicted five Chinese military officers for industrial espionage, accusing them of leading attacks on the computers...

Man Behind the First Computer Password: It's Become a Nightmare
From ACM Opinion

Man Behind the First Computer Password: It's Become a Nightmare

In the early 1960s, Fernando Corbató helped deploy the first known computer password.

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?
From ACM Opinion

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?

There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose...

The Internet's History Isn’t As "open" As You Think
From ACM Opinion

The Internet's History Isn’t As "open" As You Think

This spring, the Federal Communications Commission is deciding how to regulate the "Open Internet"—a term it uses to refer to the movement for net neutrality.

Every Little Byte Counts
From ACM Opinion

Every Little Byte Counts

In "On What We Can Not Do," a short and pungent essay published a few years ago, the Italian philosopher Giorgio Agamben outlined two ways in which power operates...

Three Questions with the Man Leading Baidu's New AI Effort
From ACM Opinion

Three Questions with the Man Leading Baidu's New AI Effort

Artificial intelligence is guided by the far-off goal of having software match humans at important tasks.

My Duolingo Learning App Can Reshape Education
From ACM Opinion

My Duolingo Learning App Can Reshape Education

Duolingo users are making new courses for people who speak Asian languages like Chinese and Hindi. How does that work?

How Google Built Its 3-D Interactive Rubik's Cube Doodle
From ACM News

How Google Built Its 3-D Interactive Rubik's Cube Doodle

Today Google launched one of its coolest doodles yet: a 3-D interactive Rubik's Cube.

"we're at Greater Risk": General Keith Alexander
From ACM Opinion

"we're at Greater Risk": General Keith Alexander

Since Edward Snowden's revelations about government surveillence, we know more about how the National Security Agency has been interpreting Section 215 of the Patriot...

Who Watches the Watchers? Big Data Goes ­nchecked
From ACM Opinion

Who Watches the Watchers? Big Data Goes ­nchecked

The National Security Agency might be tracking your phone calls. But private industry is prying far more deeply into your life.

Do We Need Asimov's Laws?
From ACM News

Do We Need Asimov's Laws?

In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...

A Sad Day
From ACM Opinion

A Sad Day

We lost Nereus today
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account