The Obama administration's progress toward the goal of making the U.S. digital infrastructure "secure, trustworthy, and resilient" has been sluggish due to the...The Washington Post From ACM TechNews | June 3, 2010
Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...Simson L. Garfinkel, Lorrie Faith Cranor From Communications of the ACM | June 1, 2010
Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...François Lévêque From Communications of the ACM | June 1, 2010
Dear KV, I've been working with some code that generates massive data sets, and . . . I'm finding that more and more often I...George V. Neville-Neil From Communications of the ACM | June 1, 2010
Parallel computation is making a comeback after a quarter century of neglect. Past research can be put to quick use today.Peter J. Denning, Jack B. Dennis From Communications of the ACM | June 1, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
Six years ago, we built Facebook around a few simple ideas. People want to share and stay connected with their friends and the people around them. If we give people...The Washington Post From ACM Opinion | May 26, 2010
All Americans--whether brown, white, or black--should be required to carry a passport showing they are red, white, and blue.Newsweek From ACM Opinion | May 14, 2010
In 1998, a hacker told Congress that he could bring down the Internet in 30 minutes by exploiting a certain flaw that sometimes caused online outages. In 2003...The Associated Press From ACM Opinion | May 10, 2010
Social networking companies don't have it easy. Advertisers covet their users' data, and in a niche that often seems to lack a clear business model, selling (or...The Electronic Frontier Foundation From ACM Opinion | May 3, 2010
The second of a two-part series highlighting several of the world's museums dedicated to preserving, exhibiting, and elucidating computing history.William Aspray From Communications of the ACM | May 1, 2010
Studying the prevalence of mobile email addiction and the associated possible implications for organizations.Ofir Turel, Alexander Serenko From Communications of the ACM | May 1, 2010
Improving the research base for computing education requires securing competitive funding commitments.Cameron Wilson, Mark Guzdial From Communications of the ACM | May 1, 2010
Assessing the strengths, weaknesses, and general applicability of the computing-as-utility business model.
Erik Brynjolfsson, Paul Hofmann, John Jordan From Communications of the ACM | May 1, 2010
In Web parlance, "chrome" is the part of the browser that surrounds the page: the address bar, the "Back" button, and those all-important bookmarks. Chrome is also...Technology Review From ACM Opinion | April 21, 2010
The Electronic Frontier Foundation (EFF) along with Google and numerous other public interest organizations and Internet industry associations joined with Yahoo...Electronic Frontier Foundation From ACM Opinion | April 16, 2010
For Marc Maiffret, the turning point in his life came when—at the age of 17—he woke up to an FBI agent pointing a gun at his head. A runaway and high school dropout...CNet From ACM Opinion | April 15, 2010
The reality--and my fears--dawned only slowly.
For weeks, friends and colleagues complained I had not answered their e-mail messages. I swore I had not received...The New York Times From ACM Opinion | April 13, 2010