Sign In

Communications of the ACM

Opinion Archive


Archives

The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.

September 2017


From ACM Opinion

The Fake-News Fallacy

The Fake-News Fallacy

On the evening of October 30, 1938, a seventy-six-year-old millworker in Grover's Mill, New Jersey, named Bill Dock heard something terrifying on the radio.


From ACM Opinion

The Darkening Web: Misinformation Is the Strongest Cyberweapon

The Darkening Web: Misinformation Is the Strongest Cyberweapon

In late June, I was leaving for a flight from Kiev's Boryspil Airport as news broke that Ukraine was the victim of another massive cyberattack.


From ACM Opinion

How We Killed Expertise

How We Killed Expertise

Average Americans have never much liked eggheads.


From ACM Opinion

Stop Cyberattacks. Just Add Robots

Stop Cyberattacks. Just Add Robots

"Are you a hacker?"


From ACM Opinion

What James Damore Got Wrong About Gender Bias in Computer Science

What James Damore Got Wrong About Gender Bias in Computer Science

In August Google employee James Damore made the news and even Wikipedia by publishing his speculation that female software engineers are underrepresented due to inherent biological differences.


From ACM Opinion

Artificial Intelligence: The Future Is Superintelligent

Artificial Intelligence: The Future Is Superintelligent

Max Tegmark is a renowned physicist. He is also the irrepressibly optimistic co-founder of the Future of Life Institute in Cambridge, Massachusetts (motto: "Technology is giving life the potential to flourish like never before…


From Communications of the ACM

When Does Law Enforcement's Demand to Read Your Data Become a Demand to Read Your Mind?

When Does Law Enforcement's Demand to Read Your Data Become a Demand to Read Your Mind?

On cryptographic backdoors and prosthetic intelligence.


From Communications of the ACM

Why Agile Teams Fail Without UX Research

Why Agile Teams Fail Without UX Research

Failures to involve end users or to collect comprehensive data representing user needs are described and solutions to avoid such failures are proposed.


From Communications of the ACM

Multitasking Without Thrashing

Multitasking Without Thrashing

Lessons from operating systems teach how to do multitasking without thrashing.


From Communications of the ACM

Digitocracy

Digitocracy

Considering law and governance in the digital age.


From Communications of the ACM

Is That Social Bot Behaving Unethically?

Is That Social Bot Behaving Unethically?

A procedure for reflection and discourse on the behavior of bots in the context of law, deception, and societal norms.

« Prev 1 2 Next »
Blog at CACM
Implications of Online Learning for Novice Students
Implications of Online Learning for Novice Students
09.21.2020

The case of the Introduction to Computer Science course.

Discovery: User Manual of the Oldest Surviving Computer in the World
Discovery: User Manual of the Oldest Surviving Computer in the World
09.21.2020

A rare find: the user manual of the oldest surviving computer in the world, the Zuse Z4 relay machine (1945).

The Laughing is Over
The Laughing is Over
09.18.2020

Celebrating the 50th anniversary of the first U.S. Computer Chess Championship in 1970.

View More Blog@CACM

Latest News
Error Discovered on Georgia Touchscreens in U.S. Senate Race
Error Discovered on Georgia Touchscreens in U.S. Senate Race
09.28.2020

Georgia election officials say they found a programming error on …

Trump Administration Signs AI R&D Agreement With the U.K.
Trump Administration Signs AI R&D Agreement With the U.K.
09.28.2020

The Trump administration announced a research and development agreement on artificial …

This Is How Much Top Hackers Are Earning From Bug Bounties
This Is How Much Top Hackers Are Earning From Bug Bounties
09.28.2020

More than $44.75 million in bounties was awarded to hackers …

View More News