Google handles nearly two-thirds of Internet search queries worldwide. Analysts reckon that most Web sites rely on the search engine for half of their traffic....The New York Times From ACM Opinion | July 15, 2010
It'd be an understatement to say that this has been a terrible week for Apple, and we haven't even reached the halfway point.CNN From ACM Opinion | July 15, 2010
Google woos people with its "don't be evil" slogan and assures us that everything it does is meant to enhance our online experience. But a new study by U.S. advocacy...New Scientist From ACM Opinion | July 12, 2010
There's a power struggle going on in the U.S. government right now. It's about who is in charge of cyber security, and how much control the government will exert...CNN From ACM Opinion | July 8, 2010
Electronic maps are arguably the quintessential innovation of 20th-century cartography. Although a few academic cartographers accord the map mystical powers, it...New Scientist From ACM Opinion | July 6, 2010
In the past week, both the Washington Post and the New York Times have referred to WikiLeaks.org, the web site that publishes confidential records, as a "whistleblower"...Federation of American Scientists From ACM Opinion | June 29, 2010
The great cosmic joke would be to find out definitively that the advances we thought were blessings--from the hormones women pump into their bodies all their lives...The New York Times From ACM Opinion | June 28, 2010
ACM's Distinguished Member Recognition Program recognizes members in three categories: Educator, Engineer, and Scientist. Each category...Marc Snir, Telle Whitney From Communications of the ACM | July 1, 2010
Introducing CMD-IT, a new center focused on synergistic activities related to ethnic minorities and people with disabilities.Valerie E. Taylor From Communications of the ACM | July 1, 2010
Considering the precedent that could be established by approval of the controversial Google book settlement.Pamela Samuelson From Communications of the ACM | July 1, 2010
Technological change results in changes in expectations, in this case affecting the workplace.Jason Borenstein From Communications of the ACM | July 1, 2010
Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.Mari Sako From Communications of the ACM | July 1, 2010
Extraordinary cases make bad law. In a sense, Armando Galarraga’s non-perfect perfect game, spoiled by an umpire’s call on what should have been the 27th out, offers...The New York Times From ACM Opinion | June 3, 2010
Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...Simson L. Garfinkel, Lorrie Faith Cranor From Communications of the ACM | June 1, 2010
Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...François Lévêque From Communications of the ACM | June 1, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
One of the great conundrums of war and technology is the odd fact that there is no such thing as a permanent first-mover advantage.Popular Mechanics From ACM Opinion | May 21, 2010
Telepathic helmets. Grid-computing swarms of cyborg insects, some for surveillance, some with lethal stingers. New cognitive-enhancement drugs. (What? AdderallProvigil...Slate From ACM Opinion | May 20, 2010