In January 1986, Basit and Amjad Alvi, sibling programmers living near the main train station in Lahore, Pakistan, wrote a piece of code to safeguard the latest...The New York Times From ACM Opinion | January 28, 2011
This past June, Alan Rusbridger, the editor of The Guardian, phoned me and asked, mysteriously, whether I had any idea how to arrange a secure communication....The New York Times From ACM News | January 27, 2011
Can I let you in on a secret? Typing two spaces after a period is totally, completely, utterly, and inarguably wrong. And yet people who use two spaces are everywhere...Slate From ACM Opinion | January 20, 2011
There is a growing sentiment among security researchers that the programmers behind the Stuxnet attack may not have been the super-elite cadre of developers that...Threat Post From ACM Opinion | January 19, 2011
With Steve Jobs' third medical-related absence in six years, Silicon Valley must again confront one of its great mysteries: How much does Jobs matter to Apple?San Jose Mercury News From ACM Opinion | January 18, 2011
Wolfram Research, a software company with deep mathematical and scientific expertise, is expanding to the broad education market with a range of mobile apps.CNET From ACM News | January 18, 2011
Through the gates of Fort George Meade pass the most powerful technical minds that the government employs. But Fort Meade's website contains pixelized, faux-shaded...Wired From ACM News | January 12, 2011
A year ago, Steve Ballmer took the stage of the Consumer Electronics Show to tout a technology that he promised would change the world: the Windows operating...Slate From ACM Opinion | January 10, 2011
High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers who can inject tiny amounts...InfoWorld From ACM News | January 7, 2011
Here is how Jon Leibowitz, chairman of the U.S. Federal Trade Commission, describes the current state of affairs on the Internet: "Say I’m walking through a mall...Newsweek From ACM Opinion | January 4, 2011
As in the real world, cyberspace has bad neighborhoods. But unlike the real world, risks in cyberspace are not easy to spot—and the location of those digital...MSNBC From ACM Opinion | December 29, 2010
A draft solution to the so-called "P versus NP" problem generated excitement in 2010; will 2011 bring a correct proof?New Scientist From ACM Opinion | December 28, 2010
The easiest way to sum up the Web in 2010 is that it was a year of growth. The big got bigger and smaller companies came out of the woodwork with new plays on...CNET From ACM News | December 21, 2010
In May 2009, The Daily Telegraph set off a political storm in Britain when it detailed widespread expense-account abuse by members of Parliament. Among the claims...The New York Times From ACM Opinion | December 20, 2010
I recently wrote a white paper entitled “Dragons, Tigers, Pearls, and Yellowcake” in which I proposed four alternative scenarios for the Stuxnet worm other than...Forbes From ACM Opinion | December 17, 2010