The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...Ari Schwartz From Communications of the ACM | June 1, 2011
Mapping the human genome showed how the Internet can play a vital part in collective scientific research. Now more scientists are collaborating—and inviting amateurs...The Observer From ACM Opinion | May 24, 2011
Without library privacy, individuals might not engage in free and open inquiry for fear that their interactions with the library will be used against them.Harvard Law School From ACM Opinion | May 20, 2011
One of the joys of the last few years has been the flood of real-world data sets being released by all sorts of organizations. These usually involve some record...O'Reilly Radar From ACM News | May 18, 2011
So Microsoft is buying Skype for $8.5 billion, its biggest deal ever. It’s too soon to make a pronouncement on whether the purchase is an idiot move, a brilliant...Wired From ACM Opinion | May 11, 2011
If there's one thing that's predictable in the technology world, it's that things change. Products that were commonplace 10 years ago (PDAs, CRT televisions,...MSNBC From ACM Opinion | May 10, 2011
The decision to drop terror chieftain Osama bin Laden’s corpse into the Arabian Sea was the final meticulous step in a raid whose details were calculated to exert...Politico From ACM Opinion | May 2, 2011
No sooner had President Obama released his long-form birth certificate than Orly Taitz, the doyenne of the "birther" movement, found reason to doubt it.The New York Times From ACM Opinion | May 2, 2011
Sony's apparent difficulty in figuring out the extent of the damage from the recent intrusion into its PlayStation Network, while frustrating for those affected...Computerworld From ACM Opinion | April 28, 2011
Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...The New York Times From ACM Opinion | April 25, 2011
In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...Tim Wu From Communications of the ACM | May 1, 2011
Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.Brian Dorn From Communications of the ACM | May 1, 2011
Studying how privacy regulation might impact economic activity on the advertising-supported Internet.Avi Goldfarb, Catherine E. Tucker From Communications of the ACM | May 1, 2011
To compete with piracy, content providers need clear value propositions that don't conflict with the product.The Guardian From ACM Opinion | April 21, 2011
The most dubious phrase in English after "act natural" is "trust me." A party asking for trust without offering a reason why is probably untrustworthy. And yet...The Economist From ACM Opinion | April 15, 2011
You probably know that some Internet and cell phone applications like Foursquare or Twitter can broadcast your location to the world. And you might know that...MSNBC From ACM News | April 15, 2011
Cisco is shutting down a business unit that it bought for over half-a-billion dollars: the Flip camcorder division. That's a shame, considering how high the Flip...Wired From ACM News | April 13, 2011