Sign In

Communications of the ACM

Recent Opinion



Removing Kode
From Communications of the ACM

Removing Kode

Dead functions and dead features.

Why Is North Korea So Good at Cybercrime?
From ACM Opinion

Why Is North Korea So Good at Cybercrime?

North Korea has moved quickly to expand its cyber capabilities, and Kim Jong Un himself has reportedly equated the importance of developing cyber capabilities to...

Your Computer Isn't Yours
From ACM Opinion

Your Computer Isn't Yours

It's here. The world that Richard Stallman predicted in 1997. The one Cory Doctorow also warned us about. Did you notice?

Quantum Computing Pioneer Warns of Complacency over Internet Security
From ACM Opinion

Quantum Computing Pioneer Warns of Complacency over Internet Security

Nature talks to Peter Shor 25 years after he showed how to make quantum computations feasible — and how they could endanger our data.

It Is Time for More Critical CS Education
From Communications of the ACM

It Is Time for More Critical CS Education

By which 'critical' means an intellectual stance of skepticism, centering the consequences, limitations, and unjust impacts of computing in society.

Copyright's Online Service Providers Safe Harbors Under Siege
From Communications of the ACM

Copyright's Online Service Providers Safe Harbors Under Siege

Reviewing the most significant changes recommended in the recently released U.S. Copyright Office Section 512 Study.

How Ransomware Puts Your Hospital at Risk
From ACM Opinion

How Ransomware Puts Your Hospital at Risk

In the midst of the Covid-19 pandemic, the potential consequences of cyberattacks are terrifying.

Just What Cyber Security Executives Don’t Want to Hear: The Skills Shortage is Worsening
From ACM Opinion

Just What Cyber Security Executives Don’t Want to Hear: The Skills Shortage is Worsening

The cyber security skills gap continues to get worse, according to the latest research.

Q&A: Researchers Clicked on Ads to Track Misinformation
From ACM Opinion

Q&A: Researchers Clicked on Ads to Track Misinformation

Researchers at the University of Washington Paul G. Allen School of Computer Science & Engineering found that both mainstream and misinformation news sites display...

We Need to Automate the Declaration of <i>Conflicts of Interest</i>
From Communications of the ACM

We Need to Automate the Declaration of Conflicts of Interest

Leveraging existing data sources to improve the declaration and management of authorship conflicts of interest.

Using Computer Programs and Search Problems for Teaching Theory of Computation
From Communications of the ACM

Using Computer Programs and Search Problems for Teaching Theory of Computation

Recognizing the significance of a cornerstone of computer science.

Autonomous Vehicle Safety
From Communications of the ACM

Autonomous Vehicle Safety: Lessons from Aviation

How more than 25years of experience with aviation safety-critical systems can be applied to autonomous vehicle systems.

A Recent Renaissance in Privacy Law
From Communications of the ACM

A Recent Renaissance in Privacy Law

Considering the recent increased attention to privacy law issues amid the typically slow pace of legal change.

TECHNOLOchicas
From Communications of the ACM

TECHNOLOchicas: A Critical Intersectional Approach Shaping the Color of Our Future

A unique partnership seeks to address the underrepresentation and unique barriers facing Latina women and girls of color in information technology.

Data-Centricity
From Communications of the ACM

Data-Centricity: A Challenge and Opportunity for Computing Education

Rethinking the content of introductory computing around a data-centric approach to better engage and support a diversity of students.

OMSCS
From Communications of the ACM

OMSCS: The Revolution Will Be Digitized

Lessons learned from the first five years of Georgia Tech's Online Master of Science in Computer Science program.

Who&#8217;s Behind Wednesday&#8217;s Epic Twitter Hack?
From ACM Opinion

Who’s Behind Wednesday’s Epic Twitter Hack?

This post is an attempt to lay out some of the timeline of the attack, and point to clues about who may have been behind it.

Formal Methods as a Path to Better Cybersecurity
From ACM Opinion

Formal Methods as a Path to Better Cybersecurity

Any piece of software should be able to provide the desired features, and when errors do occur, the software should handle them gracefully.

AI Authorship?
From Communications of the ACM

AI Authorship?

Considering the role of humans in copyright protection of outputs produced by artificial intelligence.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account