Sign In

Communications of the ACM

Opinion Archive


Archives

The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.

August 2015


From ACM Opinion

Why the Ftc Is Showing ­p at Hackers' Biggest Conferences

Why the Ftc Is Showing ­p at Hackers' Biggest Conferences

The Federal Trade Commission, the de facto federal watchdog for consumers' privacy and data security, knows it needs help.


From ACM Opinion

'right to Be Forgotten' Online Is Poised to Spread

'right to Be Forgotten' Online Is Poised to Spread

More than a year ago, in a decision that stunned many American Internet companies, Europe's highest court ruled that search engines were required to grant an unusual right—the "right to be forgotten." 


From ACM News

What a Comet Looks Like … From 9 Meters Away!

What a Comet Looks Like … From 9 Meters Away!

The European Space Agency has just released some fantastic close-up images taken by the Philae lander of the comet 67P/Churyumov-Gerasimenko.


From ACM Opinion

Is Artificial Intelligence Really an Existential Threat to Humanity?

Is Artificial Intelligence Really an Existential Threat to Humanity?

Superintelligence: Paths, Dangers, Strategies is an astonishing book with an alarming thesis: Intelligent machines are "quite possibly the most important and most daunting challenge humanity has ever faced."


From Communications of the ACM

Permissionless Innovation

Permissionless Innovation

Seeking a better approach to pharmaceutical research and development.


From Communications of the ACM

Security For Mobile and Cloud Frontiers in Healthcare

Security For Mobile and Cloud Frontiers in Healthcare

Designers and developers of healthcare information technologies must address preexisting security vulnerabilities and undiagnosed future threats.


From Communications of the ACM

Understanding the U.S. Domestic Computer Science Ph.D. Pipeline

Understanding the U.S. Domestic Computer Science Ph.D. Pipeline

Two studies provide insights into how to increase the number of domestic doctoral students in U.S. computer science programs.


From Communications of the ACM

Hickory Dickory Doc

Hickory Dickory Doc

On null encryption and automated documentation.


From Communications of the ACM

Learning Through Computational Creativity

Learning Through Computational Creativity

Improving learning and achievement in introductory computer science by incorporating creative thinking into the curriculum.

« Prev 1 2 Next »
Blog at CACM
Closing the 'Trust Gap' in Contact Tracing/Exposure Notification Technology
Closing the 'Trust Gap' in Contact Tracing/Exposure Notification Technology
08.10.2020

The digitization of contact tracing presents an array of challenges.

Can Research Universities Become Exponential?
Can Research Universities Become Exponential?
08.07.2020

We argue that exponential research and exponential teaching may exert mutual influence and foster each other, creating together the exponential …

Towards Equity in K-12 Computer Science Education: Consistency, Cumulativity and Competencies
Towards Equity in K-12 Computer Science Education: Consistency, Cumulativity and Competencies
07.31.2020

To address structural barriers in Computer Science education, school districts are now looking beyond the need for specific courses or …

View More Blog@CACM

Latest News
Tech Firms Broaden Group to Secure U.S. Election
Tech Firms Broaden Group to Secure U.S. Election
08.14.2020

Facebook, Google, and other major technology firms Wednesday announced an …

As E-Commerce Booms, Robots Pick Up Human Slack
As E-Commerce Booms, Robots Pick Up Human Slack
08.14.2020

Robots increasingly are filling some of the most common job …

Yale Quantum Researchers Create Error-Correcting Cat
Yale Quantum Researchers Create Error-Correcting Cat
08.14.2020

A new device integrates the “Schrodinger's cat” concept of superposition—a …

View More News