Why it is difficult — but essential — to monitor the effectiveness of security technologies.M. Angela Sasse From Communications of the ACM | February 1, 2010
Last week brought some bad news for mobile phone users. German security expert Karsten Nohl demonstrated how easy it is to eavesdrop on GSM-based (Global System...CNET From ACM Opinion | January 4, 2010
Last week's attempted terror attack on an airplane heading from Amsterdam to Detroit has given rise to a bunch of familiar questions.
How did the explosives get...CNN From ACM Opinion | December 30, 2009
With the caveat that the U.S. Transportation Security Administration has yet to confirm any of this on its Web site, there are several indications that orders have...TechCrunch From ACM Opinion | December 28, 2009
How platform adoption can be an important determinant of product and technological success.Michael Cusumano From Communications of the ACM | January 1, 2010
On July 17, 2008, Senator Barack Obama held a town hall meeting on national security at Purdue University. He and his panel covered issues of nuclear, biological...CERIAS From ACM Opinion | December 15, 2009
Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...Scientific American From ACM Opinion | December 8, 2009
Frequent broken builds could be symptomatic of deeper problems within a development project.George V. Neville-Neil From Communications of the ACM | December 1, 2009
Trying to categorize computing as engineering, science, or math is fruitless; we have our own paradigm.Peter J. Denning, Peter A. Freeman From Communications of the ACM | December 1, 2009
How government-industry collaboration can have far-reaching economic influences.Orna Berry, Yigal Grayeff From Communications of the ACM | December 1, 2009
Highlighting efforts and providing the rationale to increase the participation and success of underrepresented groups in computing.Richard E. Ladner From Communications of the ACM | December 1, 2009
The next biggest security threat may not be AK 47s or bomb blasts, but cyber terrorism. Terrorists can attack their enemy without stepping out of their home or...TechArena Community From ACM Opinion | November 11, 2009
A new report by a Washington policy think tank dismisses out of hand the idea that terrorist groups are currently launching cyber attacks and says that the recent...Threatpost From ACM Opinion | October 27, 2009
Members of the computer science community should become more involved in public service by becoming program managers at federal agencies, the opportunities and...Jonathan M. Smith From Communications of the ACM | November 1, 2009
Developing an effective pricing index is essential to understanding the value of broadband connectivity.Shane Greenstein From Communications of the ACM | November 1, 2009
How the U.S. Supreme Court's forthcoming decision in the Bilski v. Doll case is expected to affect existing and future software patents.Pamela Samuelson From Communications of the ACM | November 1, 2009
Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important...Butler Lampson From Communications of the ACM | November 1, 2009
A study from the RAND Corp. suggests the United States should focus on defending critical civilian and military computer networks from cyberattack, but does not...RAND Corp. From ACM TechNews | October 13, 2009
The U.S. Department of Homeland Security should be doing more to recruit top cyber security talent and develop a highly skilled workforce of cyber security workers...Federal Times From ACM CareerNews | September 14, 2009
Should computers be intuitive, requiring little to no learning or thinking? Is it even possible for them to be so?
“Nothing is intuitive,” said Slashdot blogger...LinuxInsider From ACM Opinion | September 25, 2009