The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.
The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization of space.
Six years ago, the Defense Advanced Research Projects Agency (DARPA) decided that they had a new dream. The agency wanted a system that would overlay digital tactical information right over the top of the physical world.
In 1993, Vernor Vinge wrote a paper about the end of the world.
We've all seen those movies where someone goes back in time and tries to change something (the classic "Grandfather Paradox": what happens if you go back in time and try to kill your grandfather?).
Brewster Kahle is quick to point out that we are not standing inside a former Scientology church.
For this summer's reading list, we bring you seven very different types of books that have been published since the start of the year, each of them exploring the future of innovation from a different perspective.
Earlier this week the U.S. Department of Justice indicted five Chinese military officers for industrial espionage, accusing them of leading attacks on the computers of U.S. companies including U.S. Steel and Westinghouse to gather…
In the early 1960s, Fernando Corbató helped deploy the first known computer password.
My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation of surveillance equipment on my company's network.
There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose and fix them.
In "On What We Can Not Do," a short and pungent essay published a few years ago, the Italian philosopher Giorgio Agamben outlined two ways in which power operates today.
Artificial intelligence is guided by the far-off goal of having software match humans at important tasks.
Is it true that anyone in the EU can have anything removed from Google and other search engines?
In July of 2008, Dylan Breves, then a seventeen-year-old student from New York City, made a mundane edit to a Wikipedia entry on the coati.
Duolingo users are making new courses for people who speak Asian languages like Chinese and Hindi. How does that work?
Today Google launched one of its coolest doodles yet: a 3-D interactive Rubik's Cube.
The Internet's eyes turned to the Federal Communications Commission on Thursday, as the panel approved a plan to consider allowing Internet service providers to charge Web sites like Netflix for higher-quality delivery of their…
The Internet has much to say about the recent ruling by the Court of Justice of the European Union, which determines that if a person wants some personal information removed from Google's search engine, that person has the right…
I'm as big a believer in the transformational power of cloud computing as anyone you'll meet.
Since Edward Snowden's revelations about government surveillence, we know more about how the National Security Agency has been interpreting Section 215 of the Patriot Act and Section 702 of the Foreign Intelligence Surveillance…
The National Security Agency might be tracking your phone calls. But private industry is prying far more deeply into your life.
In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots.
Re "Reading, Writing, Arithmetic and Now Coding" (front page, May 11): Schools and parents are really off the mark in introducing coding (and technology in general) to young children.
We lost Nereus today
The European Courts of Justice ruled on Tuesday that an individual could demand that "irrelevant or outdated" information be deleted from results.
In a ruling that could undermine press freedoms and free speech, the highest court of the European Union said on Tuesday that Google must comply with requests from individuals to remove links on search results pages to newspaper…
The history of the Internet is one of lonely people trying to find one another.
Amy Robinson pulls no punches.
In June 2013, Edward Snowden was sitting in his room at the Mira hotel in Hong Kong, watching the world react to the first of his explosive leaks about the NSA's out-of-control surveillance, when he was tipped off that the NSA…
Broadly, NoSQL has an absence of strict schemas for entities/attributes, while SQL rigidly relates/regulates the two.
Rather than fancying you can control Internet access, design exams to reward students who won't need it.
Teaching is a skill, and the best teachers use the best methods.
A submarine fiber-optic cable owned by Google was used by …
Farmers worldwide are using new precision-farming technologies to address agricultural …
The nonprofit MAUI63 organization hopes to preserve New Zealand's endangered …