acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Lessons From the Loo
From Communications of the ACM

Lessons From the Loo

Illustrating privacy concepts with potty talk.

Responsible Computing During COVID-19 and Beyond
From Communications of the ACM

Responsible Computing During COVID-19 and Beyond

Navigating the ethical and societal impacts of technologies.

The Limits of Differential Privacy (and Its Misuse in Data Release and Machine Learning)
From Communications of the ACM

The Limits of Differential Privacy (and Its Misuse in Data Release and Machine Learning)

Differential privacy is not a silver bullet for all privacy problems.

Google's AI Approach to Microchips Is Welcome—but Needs Care
From ACM Opinion

Google's AI Approach to Microchips Is Welcome—but Needs Care

Artificial intelligence can help the electronics industry to speed up chip design. But the gains must be shared equitably.

What Makes Quantum Computing So Hard to Explain?
From ACM Opinion

What Makes Quantum Computing So Hard to Explain?

To understand what quantum computers can do—and what they can’t—avoid falling for overly simple explanations.

Self-Driving Cars Might Never Be Able to Drive Themselves
From ACM Opinion

Self-Driving Cars Might Never Be Able to Drive Themselves

Producing truly autonomous vehicles requires a fundamental shift in current approaches.

Collusion Rings Threaten the Integrity of Computer Science Research
From Communications of the ACM

Collusion Rings Threaten the Integrity of Computer Science Research

Experiences discovering attempts to subvert the peer-review process.

Aversion to Versions
From Communications of the ACM

Aversion to Versions

Code needs to run anywhere as long as the necessary dependencies can be resolved.

The Risks of Election Believability (or Lack Thereof)
From Communications of the ACM

The Risks of Election Believability (or Lack Thereof)

With 90% of the 2020 U.S. general election ballot contents verifiable by paper, why do only 65% of voters trust the results?

Defining a Role for AI Ethics in National Security
From ACM Opinion

Defining a Role for AI Ethics in National Security

Mariarosaria Taddeo, an associate professor and senior research fellow at the Oxford Internet Institute and Dstl Ethics Fellow at the Alan Turing Institute, discusses...

Understanding the Differences Between Biological and Computer Vision
From ACM Opinion

Understanding the Differences Between Biological and Computer Vision

Harvard Medical University Professor Gabriel Kreiman provides an account of how humans and animals process visual data and how far techno come toward replicating...

Trustworthy Scientific Computing
From Communications of the ACM

Trustworthy Scientific Computing

Addressing the trust issues underlying the current limits on data sharing.

Software Professionals, Malpractice Law, and Codes of Ethics
From Communications of the ACM

Software Professionals, Malpractice Law, and Codes of Ethics

In pursuit of professional status for computing professionals.

Understanding Law and the Rule of Law
From Communications of the ACM

Understanding Law and the Rule of Law: A Plea to Augment CS Curricula

Why law matters for computer scientists and other folk.

The 10 Best Practices for Remote Software Engineering
From Communications of the ACM

The 10 Best Practices for Remote Software Engineering

Focusing on the human element of remote software engineer productivity.

Let's Be Honest
From Communications of the ACM

Let's Be Honest

Seeking to rectify the two mutually exclusive ways of comparing computational power — encoding and simulation.

Tech in the Post-Pandemic World
From ACM Opinion

Tech in the Post-Pandemic World

Assessing its future, both the bad and the good.

Building a Multilingual Wikipedia
From Communications of the ACM

Building a Multilingual Wikipedia

Seeking to develop a multilingual Wikipedia where content can be shared among language editions.

Roots of 'Program' Revisited
From Communications of the ACM

Roots of 'Program' Revisited

Considering the fundamental nature and malleability of programming.

When Hackers Were Heroes
From Communications of the ACM

When Hackers Were Heroes

The complex legacy of Steven Levy's obsessive programmers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account