The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.
Wherever you're sitting right now, take a moment to note the connected devices around you.
Maybe it's your mom and/or dad. Maybe it's a sibling or a grandparent. Or maybe it's just that one friend who still uses a Motorola Razr from the early 2000s.
Internet security relies on the fact that our computers can't break its cryptosystems. But the quantum algorithm you devised has the potential to do just that.
For the first time in memory, adults in the United States under age forty are now expected to be poorer than their parents.
You worked for years at Microsoft, where things now look uncertain.
Computer scientist Carver Mead gave Moore's Law its name in around 1970 and played a crucial role in making sure it's held true in the decades since.
University of Illinois at Urbana-Champaign National Center for Supercomputing Application director Thom Dunning discusses the potential for using computational simulation to transform scientific and engineering education.
On October 21, the Wikimedia Foundation issued a statement from Sue Gardner, our executive director, condemning the black hat practice of paid advocacy editing and sockpuppeting on Wikipedia.
Both consumer electronics and apparel are notoriously difficult businesses competing in mature industries. Wearable technology—everything from activity trackers like Fitbits and Misfits to watches like the Pebble to jewelry…
It's a question that’s perplexed philosophers for centuries and scientists for decades: Where does consciousness come from?
Federal judge Denny Chin rejected a copyright challenge Google’s practices of scanning books into digital format and presenting snippets of those scans in search results because the practices qualify as fair use.
Computers as we know them have are close to reaching an inflection point—the next generation is in sight but not quite within our grasp.
The probe sails through space, traveling the distance of the LA-to-Chicago red-eye in a minute.
The internet backbone—the infrastructure of networks upon which internet traffic travels—went from being a passive infrastructure for communication to an active weapon for attacks.
Forget extra cupholders or power windows: the new Renault Zoe comes with a "feature" that absolutely nobody wants.
Google X is responsible for some of Google's most literally fantastic projects: Google Glass, self-driving cars, gigantic inflatable balloons that beam Internet down to the disconnected.
Excited teenagers—in other words normal teenagers—have never been famous for consistently wise decisions, nor should they be.
Q: There's a concern that, because of all the in-house perks, tech companies don't help local economies that much.A: I feel the opposite. We have done two studies, and both verify every tech job that is created in San Francisco…
For many tech companies, design is no longer subjective.
Tony Fadell is the founder and chief executive of Nest, a company that is trying to bring a high-end technology experience to some of the most prosaic areas of the home.
The cover story of Life magazine on Oct. 16 was "U.S. Schools: They Face a Crisis."
We are all Angela Merkel.
"Bitcoin Is Broken," proclaimed Ittay Eyal and Emin Gun Sirer, two Cornell computer scientists.
And not just superficially so, but fundamentally, at the core protocol level.
Markus Persson, known also by the online handle "Notch," is an indie game success story like no other.
"Women shouldn't have rights." "Women shouldn't vote." "Women shouldn't work."
We believe that our customers have a right to understand how their personal information is handled, and we consider it our responsibility to provide them with the best privacy protections available.
It was 25 years ago Tuesday that The New York Times first named 23-year-old Cornell graduate student Robert Morris as the culprit behind what became known as the Morris Worm, the Internet's first major malware outbreak.
Sir Tim Berners-Lee, the computer scientist who created the World Wide Web, has called for a "full and frank public debate" over Internet surveillance by the National Security Agency and its British counterpart, GCHQ, warning…
The ambitious systems that we develop today need a proper requirements structure. The plan defined here organizes requirements specification along …
The circular slide rule was widely used until the 1970s.
The focus is on executable exams for an Introduction to Computer Science course.