Opinion Archive


Articles Interviews Opinion Archive 2019DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2018DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2017DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2016DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2015DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2014DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2013DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2012DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2011DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2010DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2009DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2008DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary
Archives

The opinion archive provides access to past opinion stories from Communications of the ACM and other sources by date.

December 2019


From ACM Opinion

Stop Saying Driverless Cars Will Help Old People

Stop Saying Driverless Cars Will Help Old People

And maybe start including them in research instead of just assuming we know what they want.

Wired | December 6, 2019

From ACM Opinion

Artificial Intelligence and the Adversary

Artificial Intelligence and the Adversary

The AI that our top scientists and engineers are now building to advance American security and prosperity could instead sow the seeds of our demise.

The Wall Street Journal | December 5, 2019

From ACM Opinion

Jenny Xu's App Helps Students Build Hackathon Teams

Jenny Xu's App Helps Students Build Hackathon Teams

Jenny Xu, a junior at Stony Brook University, has developed and introduced Hacker Matcher, an app for team building at hackathons.

Stony Brook University | December 3, 2019

From Communications of the ACM

Should Researchers Use Data from Security Breaches?

Should Researchers Use Data from Security Breaches?

Evaluating the arguments for and against using digital data derived from security breaches.

David M. Douglas | December 1, 2019

From Communications of the ACM

Koding Academies

Koding Academies

A low-risk path to becoming a front-end plumber.

George V. Neville-Neil | December 1, 2019

From Communications of the ACM

Uncertainty

Uncertainty

Considering how to best navigate stability and randomness.

Peter J. Denning, Ted G. Lewis | December 1, 2019

From Communications of the ACM

Public Entrepreneurship and Policy Engineering

Public Entrepreneurship and Policy Engineering

Training the next generation of leader and problem solver.

Beth Simone Noveck | December 1, 2019
Blog at CACM
Voting, Coding, and the Code
Voting, Coding, and the Code
11.27.2019

Voting is more than counting.

Are My Requirements Complete?
Are My Requirements Complete?
11.26.2019

Knowing the notion of sufficient completeness and the theory of abstract data types helps practitioners produce better requirements.

Leonardo da Vinci's Robot Lion
Leonardo da Vinci's Robot Lion
11.04.2019

We are celebrating the 500th anniversary of Leonardo da Vinci's death with a major exhibition of the Renaissance painter's works.

View More [email protected]

Latest News
Software Aims To Make Science More Replicable
Software Aims To Make Science More Replicable
12.10.2019

A new open-source program combines the functions of a word …

Amazon Rolls Out Quantum-Computing Service
Amazon Rolls Out Quantum-Computing Service
12.10.2019

Amazon Web Services has launched a platform that lets enterprise …

New Data Addresses Gap in Fusion Research
New Data Addresses Gap in Fusion Research
12.10.2019

Researchers have developed a method of enhancing the accuracy of …

View More News