The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.
Singularity. Posthuman. Techno-Optimism, Cyborgism. Humanity+. Immortalist. Machine intelligence. Biohacker. Robotopia. Life extension. Transhumanism.
Every day our DNA breaks a little. Special enzymes keep our genome intact while we're alive, but after death, once the oxygen runs out, there is no more repair.
For all the talk about using big data and data science to solve the world’s problems—and even all the talk about big data as one of the world’s problems—it seems like we still have a long way to go.
Becky Burr, chief privacy officer of Neustart, discusses the company's privacy-by-design policy, public misconceptions about data collection, and what she does to safeguard her information.
In the four years since the car service Uber launched, it has been beset by criticism from myriad groups, including city officials annoyed by its sometimes cavalier attitude toward regulation and taxi companies annoyed by increased…
Chuck Hull, 75, is co-founder and chief technology officer of 3D Systems. He is the inventor of the 3-D printer, which recently celebrated its 31st anniversary.
For the last half-century we've had a popular notion that our intellectual culture is sundered in two—the literary and the scientific.
Bowing to their better civic natures, and the pleas of James Foley's family, Twitter and YouTube have pulled down videos and photos of his murder.
For all of its history, the Internet has enjoyed the fruits of an openness principle: the idea that anyone can reach any site online and that information and data should be freely exchangeable.
The BBC has interviewed Andrew Lewman, executive director of the Tor Project.
In a fast-moving war with an elusive foe like the Islamic State militants, information is as important as guns, jet fighters and bombs.
Michael Brown, the unarmed teenager who was shot during an encounter with police in Ferguson, Mo., on Aug. 9, was recorded by a convenience store surveillance camera a few minutes before he was killed, according to police.
Just as Islamic State (IS) has swept across Iraq, so too has it swarmed over social media—using the platform with a sophistication never before witnessed in this way.
A Senior cryptography expert has claimed multiple issues with PGP email encryption—an open source end-to-end encryption to secure email.
Jim Yurchenco was responsible for squeezing the guts inside the impossibly slim Palm V.
We’ve all done it: We’re at an event, we take a bunch of photos with our phones, we take a selfie and maybe one with a friend, we post all the images online, and we’re done.
The Internet has already changed how we live and work, and we're only just getting started. Who'd have thought even five years ago that people would be streaming Ultra HD 4K video over their home Internet connections?
C++ designer Bjarne Stroustrup says the programming language remains vital and relevant 35 years after he first designed it because of its ability to handle complexity, making it the go-to solution for telecom, financial, and…
All these people are trying to kill email.
More than a year after ex-National Security Agency contractor Edward Snowden began leaking details of the agency's electronic surveillance programs, questions remain about how he accessed so many documents, and about the technology…
A growing stack of companies would like you to pay a monthly fee to read e-books, just like you subscribe to Netflix to binge on movies and TV shows.
I threw down a bit of a challenge last month at the Association of Medical Illustrators Conference in Minnesota.
Christian Rudder, co-founder and president of the IAC/InterActiveCorp.'s OkCupid, caused a stir recently when he responded to Facebook's news feed controversy with some no-regrets commentsabout the dating website's own experiments…
Bob Fraser explains what it feels like to pilot a Jetstream airliner containing passengers on 800-kilometre trips from his desk at BAE Systems in Warton, U.K.
For one weekend every year, thousands of the world’s best—or worst, depending on your point of view—hackers meet in Las Vegas, Nevada, for Defcon.
The singularity—or, to give it its proper title, the technological singularity. It's an idea that has taken on a life of its own; more of a life, I suspect, than what it predicts ever will.
In the computer and network security industry, few people are as well known as Dan Geer.
There's this great Andy Warhol quote you’ve probably seen before: "I think everybody should like everybody."
In the depths of night on August 5th 1914 the British Cable Ship Alert took the first significant action of World War I, severing the five German submarine cables that ran through the English Channel.
Humans are affecting the Earth’s systems on a global scale. Industrial pollutants are accumulating in our atmosphere with the potential for long-term impact on global climate and biodiversity.
The ambitious systems that we develop today need a proper requirements structure. The plan defined here organizes requirements specification along …
The circular slide rule was widely used until the 1970s.
The focus is on executable exams for an Introduction to Computer Science course.