The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.
At America's intelligence agencies, there are three ways to "steal secrets," says former CIA and NSA director Michael Hayden: Humans, signals and imagery.
The telephone swept into Americans' lives in the first decades of the 20th century.
The race is on to build the world's first meaningful quantum computer—one that can deliver the technology's long-promised ability to help scientists do things like develop miraculous new materials, encrypt data with near-perfect…
Back in 2013, when you could still mine bitcoins at home, Wired was sent a small, sleek mining device manufactured by the now-defunct Butterfly Labs.
They're curious messengers, these ants in your in-box.
From time to time over the past few years, I've politely refused requests to referee an article on the grounds that it lacks enough information for me to check the work. This can be a hard thing to explain.
Starting tomorrow, a new framework for consumer data protection goes into effect in Europe.
You have probably noticed a flood of emails and alerts from companies in the past few weeks informing you about changes to their privacy policies.
Big technology companies must rethink the way they develop products and services to put ethical considerations in the forefront, DeepMind co-founder Mustafa Suleyman said.
As automated and autonomous vehicles become more common on U.S. roads, it's worth a look at what these machines can—and can't—do.
A few years ago, Timothy Bickmore, a computer scientist at Northeastern University, developed an artificial-intelligence program to help low-income patients at Boston Medical Center prepare for their return home from the hospital…
Artificial intelligence owes a lot of its smarts to Judea Pearl.
Google's Duplex voice assistant drew applause last week at the company's annual I/O developer conference after CEO Sundar Pichai demonstrated the artificially intelligent technology autonomously booking a hair salon appointment…
There are times when the diagnosis announces itself as the patient walks in, because the body is, among other things, a text.
Over the past five years, artificial intelligence has gone from perennial vaporware to one of the technology industry's brightest hopes.
What a time for artificial intelligence!
There is a growing realization that our data is under attack.
Three years ago, at a conference on transatlantic issues, the subject of artificial intelligence appeared on the agenda. I was on the verge of skipping that session—it lay outside my usual concerns—but the beginning of the presentation…
It was getting late in Tomato Town. The storm was closing in, and meteors pelted the ground.
As the lead statistician at the nonprofit Human Rights Data Analysis Group, Kristian Lum, 33, is trying to make sure the algorithms increasingly controlling our lives are as fair as possible.
In the search for extraterrestrial intelligence (SETI), we've often looked for signs of intelligence, technology and communication that are similar to our own.
Technology was identified as the true official religion of the modern state more than seventy years ago by the late Christian anarchist philosopher Jacques Ellul.
Earlier this year, astronomers stumbled upon a fascinating finding: Thousands of black holes likely exist near the center of our galaxy.
For the last few years, police forces around China have invested heavily to build the world's largest video surveillance and facial recognition system, incorporating more than 170 million cameras so far.
The word "predictable" first entered the English language two centuries ago.
In the spring of 1964 the filmmaker Stanley Kubrick was very worried. NASA was about to fly the Mariner 4 space probe past Mars.
A pre-eminent twentieth-century physicist and a Nobel laureate: Richard Feynman was certainly those. He was also much more.
How do New York Times journalists use technology in their jobs and in their personal lives? Cecilia Kang, a technology reporter based in Washington, discussed the tech she's using.
The conversation seems mundane. At least, at first.
Precisely how and when will our curiosity kill us?
The ambitious systems that we develop today need a proper requirements structure. The plan defined here organizes requirements specification along …
The circular slide rule was widely used until the 1970s.
The focus is on executable exams for an Introduction to Computer Science course.