acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Cybersecurity Research for the Future
From Communications of the ACM

Cybersecurity Research for the Future

Considering the wide range of technological and societal trade-offs associated with cybersecurity.

Boeing's 737 MAX
From Communications of the ACM

Boeing's 737 MAX: A Failure of Management, Not Just Technology

Tracing the trajectory of management and engineering decisions resulting in systemic catastrophe.

How to Best Use Data to Meet Your DE&I Goals
From ACM Opinion

How to Best Use Data to Meet Your DE&I Goals

The collection, analysis, and disclosure of diversity data holds the promise of being a powerful lever for progress.

What Does It Take To Build a Chip Industry In India?
From ACM Opinion

What Does It Take To Build a Chip Industry In India?

An interview with Balajee Sowrirajan of Samsung Semiconductor India R&D.

Imagine a World Without Apps
From ACM Opinion

Imagine a World Without Apps

Video games are inching away from apps. Maybe every other industry can, too.

Federated Learning for Privacy-Preserving AI
From Communications of the ACM

Federated Learning for Privacy-Preserving AI

Engineering and algorithmic framework to ensure data privacy and user confidentiality.

Silicon Politics
From Communications of the ACM

Silicon Politics

Tracing the widening path between Silicon Valley and Washington, D.C.

Removing Kode
From Communications of the ACM

Removing Kode

Dead functions and dead features.

Navigating in Real-Time Environments
From Communications of the ACM

Navigating in Real-Time Environments

An interview with Jim Selman.

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education
From Communications of the ACM

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education

Incorporating equity and inclusion in the effort toward access for everyone.

Operationalizing AI Ethics Principles
From Communications of the ACM

Operationalizing AI Ethics Principles

A better ethics analysis guide for developers.

Why Is North Korea So Good at Cybercrime?
From ACM Opinion

Why Is North Korea So Good at Cybercrime?

North Korea has moved quickly to expand its cyber capabilities, and Kim Jong Un himself has reportedly equated the importance of developing cyber capabilities to...

Your Computer Isn't Yours
From ACM Opinion

Your Computer Isn't Yours

It's here. The world that Richard Stallman predicted in 1997. The one Cory Doctorow also warned us about. Did you notice?

AI Pioneer Geoff Hinton: 'Deep Learning Is Going to Be Able to Do Everything'
From ACM Opinion

AI Pioneer Geoff Hinton: 'Deep Learning Is Going to Be Able to Do Everything'

Thirty years ago, Geoffrey Hinton's belief in neural networks was contrarian. Now it's hard to find people who disagree with him.

Quantum Computing Pioneer Warns of Complacency over Internet Security
From ACM Opinion

Quantum Computing Pioneer Warns of Complacency over Internet Security

Nature talks to Peter Shor 25 years after he showed how to make quantum computations feasible — and how they could endanger our data.

Reason-Checking Fake News
From Communications of the ACM

Reason-Checking Fake News

Using argument technology to strengthen critical literacy skills for assessing media reports.

Where Should Your IT Constraint Be?
From Communications of the ACM

Where Should Your IT Constraint Be?: The Case of the Financial Services Industry

Locating the strategic location of the IT junction constraint.

It Is Time for More Critical CS Education
From Communications of the ACM

It Is Time for More Critical CS Education

By which 'critical' means an intellectual stance of skepticism, centering the consequences, limitations, and unjust impacts of computing in society.

Using Data and Respecting Users
From Communications of the ACM

Using Data and Respecting Users

Three technical and legal approaches that create value from data and foster user trust.

Copyright's Online Service Providers Safe Harbors Under Siege
From Communications of the ACM

Copyright's Online Service Providers Safe Harbors Under Siege

Reviewing the most significant changes recommended in the recently released U.S. Copyright Office Section 512 Study.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account