Sign In

Communications of the ACM

Opinion Archive


Archives

The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.

August 2015


From ACM Opinion

Why the Ftc Is Showing ­p at Hackers' Biggest Conferences

Why the Ftc Is Showing ­p at Hackers' Biggest Conferences

The Federal Trade Commission, the de facto federal watchdog for consumers' privacy and data security, knows it needs help.


From ACM Opinion

'right to Be Forgotten' Online Is Poised to Spread

'right to Be Forgotten' Online Is Poised to Spread

More than a year ago, in a decision that stunned many American Internet companies, Europe's highest court ruled that search engines were required to grant an unusual right—the "right to be forgotten." 


From ACM News

What a Comet Looks Like … From 9 Meters Away!

What a Comet Looks Like … From 9 Meters Away!

The European Space Agency has just released some fantastic close-up images taken by the Philae lander of the comet 67P/Churyumov-Gerasimenko.


From ACM Opinion

Is Artificial Intelligence Really an Existential Threat to Humanity?

Is Artificial Intelligence Really an Existential Threat to Humanity?

Superintelligence: Paths, Dangers, Strategies is an astonishing book with an alarming thesis: Intelligent machines are "quite possibly the most important and most daunting challenge humanity has ever faced."


From Communications of the ACM

Permissionless Innovation

Permissionless Innovation

Seeking a better approach to pharmaceutical research and development.


From Communications of the ACM

Security For Mobile and Cloud Frontiers in Healthcare

Security For Mobile and Cloud Frontiers in Healthcare

Designers and developers of healthcare information technologies must address preexisting security vulnerabilities and undiagnosed future threats.


From Communications of the ACM

Understanding the U.S. Domestic Computer Science Ph.D. Pipeline

Understanding the U.S. Domestic Computer Science Ph.D. Pipeline

Two studies provide insights into how to increase the number of domestic doctoral students in U.S. computer science programs.


From Communications of the ACM

Hickory Dickory Doc

Hickory Dickory Doc

On null encryption and automated documentation.


From Communications of the ACM

Learning Through Computational Creativity

Learning Through Computational Creativity

Improving learning and achievement in introductory computer science by incorporating creative thinking into the curriculum.

« Prev 1 2 Next »
Blog at CACM
Computing Ethics and Teaching It
Computing Ethics and Teaching It
07.06.2020

Ethics can and should be presented to computer science students in appropriate ways.

'Underrepresented Minority' Considered Harmful, Racist Language
'Underrepresented Minority' Considered Harmful, Racist Language
06.19.2020

The foundation of any collective action, of any community, is language. It influences how we feel, react, and understand.

The Advantages of Teaching Soft Skills to CS Undergrads Online
The Advantages of Teaching Soft Skills to CS Undergrads Online
06.08.2020

On the added value of teaching an online soft skills course to undergrad computer science students.

View More Blog@CACM

Latest News
Virtual Try-Ons Replacing Fitting Rooms During the Pandemic
Virtual Try-Ons Replacing Fitting Rooms During the Pandemic
07.13.2020

The Covid-19 pandemic has spurred consumers to substitute fitting rooms …

Filter Protects Against Deepfake Photos, Videos
Filter Protects Against Deepfake Photos, Videos
07.13.2020

Computer scientists at Boston University have created an algorithm that …

Home Router Warning: They're Riddled With Known Flaws and Run Ancient, Unpatched Linux
Home Router Warning: They're Riddled With Known Flaws and Run Ancient, Unpatched Linux
07.13.2020

Researchers studied 127 home routers from seven brands and found …

View More News