The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.
Apple's fight with the FBI is widening beyond the courts.
Are Apple and other tech companies somehow against America's national security if they create uncrackable encryption software that government investigators or even the company's own engineers can't break into?
Imagine buying an internet-enabled surveillance camera, network attached storage device, or home automation gizmo, only to find that it secretly and constantly phones home to a vast peer-to-peer (P2P) network run by the Chinese…
Would you stop buying Apple's products if it decided to help the FBI open a terrorist's iPhone?
There's been a lot of bluster about the ongoing encryption saga between the FBI and Apple.
Ben Wizner, a top attorney at the American Civil Liberties Union, is probably best known for being one of the lawyers representing Ed Snowden, the former National Security Agency contractor.
The skirmish between Apple and the FBI is quickly escalating to a battle royal, a fight to the finish over lofty principles and national values, involving not just this company and this bureau but all of Silicon Valley and the…
Each summer, the computer-science researchers behind the world's best poker-playing robots bring their creations together for a tournament.
The San Bernardino litigation isn't about trying to set a precedent or send any kind of message.
The high-stakes stalemate between Apple and the Justice Department isn’t the first time that Washington and Silicon Valley have come to a showdown over security and privacy.
"Are you sure they're there?" the decision maker asks. "They" are Qaeda operatives who have been planning attacks against the United States.
Without cheaper devices and more affordable broadband plans, universal Internet access won't be possible until 2042, according to a new report.
The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and also generated some misinformation.
The Computer Science for All initiative will put the spotlight on a certain type of computing professional: the software developer. But there are even more computing jobs available outside of coding.
National Security Agency Director Adm. Michael Rogers warns that encryption is making it "much more difficult" for the agency to intercept the communications of terrorist groups like the Islamic State, citing November's Paris…
It's taken more than a decade, but a critical oversight board tasked with advising the president on the privacy and civil liberties implications of the NSA's surveillance programs is finally getting a technology adviser who understands…
The most striking aspect of Apple's message to customers on Tuesday wasn't the rejection of U.S. authorities' demand that the company help them break the encryption of an iPhone owned by Syed Rizwan Farook, who was involved in…
We learned on Tuesday evening that a U.S. federal magistrate judge ordered Apple to backdoor an iPhone that was used by one of the perpetrators of the San Bernardino shootings in December.
We have been following D-Wave's claims about its quantum hardware at Ars for a number of years. Over that time, my impression has oscillated between skepticism, strong skepticism, and mild enthusiasm.
Some people are already used to having their personal information exposed in massive data breaches.
Moore's law has died at the age of 51 after an extended illness.
A picture may be worth a thousand words, but the inverse is also true: A word is worth a thousand pictures.
It was a simple enough question, at least in this part of the world.
The end of White House terms are often about trying to shape historic legacies, and President Obama is out to build his in the new area of cybersecurity.
Congress could soon vote on a bill that would require law enforcement agencies to get a search warrant from a judge to obtain emails, photographs and other documents Americans have stored online.
One night in late July 2014, a journalist from the Chinese newspaper Southern Weeklyinterviewed a 17-year-old Chinese girl named Xiaoice (pronounced Shao-ice).
To the computer scientist Leslie Valiant, "machine learning" is redundant.
When digital dystopians and critics of Internet libertarians need a rhetorical dart board, they often pull out a document written by John Perry Barlow, co-founder of the nonprofit Electronic Frontier Foundation, a former cattle…
When Jill Tarter first began to look for aliens, she drew looks askance from her friends and colleagues.
Software is already pervasive in our society, but artificial intelligence software raises unique concerns even among the technological elite.
Napier's multiplication and division rods, deriving from the basic multiplication table, simplify calculations considerably.
How to strengthen the security of the Internet of Things in organizations.
We describe our choice of the solar system as one of the main illustrative examples used in our MOOC on …