Guidelines for the enterprise.
Maja Vukovic, Jim Laredo, Vinod Muthusamy, Aleksander Slominski, Roman Vaculin, Wei Tan, Vijay Naik, Ignacio Silva-Lepe, Arun Kumar, Biplav Srivastava, Joel W. Branch From Communications of the ACM | March 1, 2016
In addition to alliances created for broadening participation in computing, research is required to better utilize the knowledge they have produced.Tiffany Barnes, George K. Thiruvathukal From Communications of the ACM | March 1, 2016
A recent celebration of 50 years of operating system research yields lessons for all professionals in designing offers for their clients.Peter J. Denning From Communications of the ACM | March 1, 2016
The skirmish between Apple and the FBI is quickly escalating to a battle royal, a fight to the finish over lofty principles and national values, involving not just...Slate From ACM Opinion | February 24, 2016
Each summer, the computer-science researchers behind the world's best poker-playing robots bring their creations together for a tournament.The Atlantic From ACM Opinion | February 22, 2016
"Are you sure they're there?" the decision maker asks. "They" are Qaeda operatives who have been planning attacks against the United States.The New York Times From ACM Opinion | February 22, 2016
The high-stakes stalemate between Apple and the Justice Department isn’t the first time that Washington and Silicon Valley have come to a showdown over security...The Wall Street Journal From ACM Opinion | February 22, 2016
Without cheaper devices and more affordable broadband plans, universal Internet access won't be possible until 2042, according to a new report.CNET From ACM Opinion | February 22, 2016
The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and...Wired From ACM News | February 19, 2016
The Computer Science for All initiative will put the spotlight on a certain type of computing professional: the software developer. But there are even more computing...The Hill From ACM Opinion | February 19, 2016
The most striking aspect of Apple's message to customers on Tuesday wasn't the rejection of U.S. authorities' demand that the company help them break the encryption...Bloomberg View From ACM Opinion | February 17, 2016
We learned on Tuesday evening that a U.S. federal magistrate judge ordered Apple to backdoor an iPhone that was used by one of the perpetrators of the San Bernardino...The Electronic Frontier Foundation From ACM Opinion | February 17, 2016
We have been following D-Wave's claims about its quantum hardware at Ars for a number of years. Over that time, my impression has oscillated between skepticism,...Ars Technica From ACM Opinion | February 16, 2016
Some people are already used to having their personal information exposed in massive data breaches.The Washington Post From ACM Opinion | February 12, 2016
A picture may be worth a thousand words, but the inverse is also true: A word is worth a thousand pictures.The Atlantic From ACM Opinion | February 11, 2016