The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.
As the affordability and use of mobile phones in Africa increase, so too will security vulnerabilities.
The increasing volume of research data highlights the need for reliable, cost-effective data storage and preservation at the national scale.
Imagine a CPU designed to issue and execute up to seven instructions per clock cycle, with a clock rate 10 times faster than the reigning supercomputer. This is the ACS-1 supercomputer designed more than 40 years ago.
In order to thrive and even survive in the worldwide marketplace of ideas and innovation, the U.S. must aggressively meet the challenge of increasing the number of students…
While it is true that "programmers aren't English majors," there are many days that I wish they were, or that they knew one and offered to help with…
Digital object repositories are on the cusp of resolving the long-standing problem of universal information access in the Internet.
By 2019, I generally thought there wasn't much that could surprise me about organizing meetups. Then Covid-19 hit. I was …
Napier's multiplication and division rods, deriving from the basic multiplication table, simplify calculations considerably.
How to strengthen the security of the Internet of Things in organizations.