About nine years ago, I had a question for Min Kao, the CEO of the GPS concern Garmin. His answer was determined, and I thought of it as I watched the news from...AllThingsD From ACM Opinion | June 22, 2012
When Alan Turing arrived to start work at the National Physical Laboratory at Teddington, south-west London, he was 33 years old. It was October 1945 and he was...BBC News From ACM Opinion | June 22, 2012
Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense challenges, including management...Sarah Spiekermann From Communications of the ACM | July 1, 2012
By closely connecting research and development Google is able to conduct experiments on an unprecedented scale, often resulting in new capabilities for the company...Alfred Spector, Peter Norvig, Slav Petrov From Communications of the ACM | July 1, 2012
All computer scientists know about the Universal Turing Machine, one of the foundation stones of theoretical computer science. Much less well known is the practical...Martin Campbell-Kelly From Communications of the ACM | July 1, 2012
Many proposed solutions to the species-threatening transformations born of human industrialization have an engineering orientation. Often the suggested remedies...R. T. Watson, J. Corbett, M. C. Boudreau, J. Webster From Communications of the ACM | July 1, 2012
Considering the legal responsibilities of Internet intermediaries in the aftermath of the Stop Online Privacy Act controversy.Pamela Samuelson From Communications of the ACM | July 1, 2012
On June 18, Microsoft beckoned 200 or so members of the media to a grimy, industrial part of Hollywood for what it described as a can’t-miss affair.Bloomberg Businessweek From ACM Opinion | June 20, 2012
Here's a question: if you connect an unprotected Windows computer to the Internet, how long will it take before it is infected by malicious software?The Guardian From ACM Opinion | June 19, 2012
When the news about the Flame malware first broke several weeks ago, people from all parts of the security community, political world and elsewhere quickly began...Threatpost From ACM Opinion | June 18, 2012
In what way do you spend your time online? Do you check your email compulsively? Watch lots of videos? Switch frequently among multiple Internet applications—from...The New York Times From ACM News | June 18, 2012
A store of information dubbed the "Knowledge Graph" now adds useful context and detail to the list of links that Google serves up.Technology Review From ACM News | June 15, 2012
If you're an experienced computer user, you probably remember explaining to newbies how a desktop computer worked: Your photos should go in this folder; your documents...The New York Times From ACM Opinion | June 15, 2012
The U.S. Public Policy Council of the Association of Computing Machinery, representing ACM, came out against CISPA, the cybersecurity legislation recently passed...Electronic Frontier Foundation From ACM Opinion | June 13, 2012
That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.The New York Times From ACM News | June 12, 2012
Has the U.S. government been caught with its virtual hands in the world's cookie jar? And might it lose control of the Internet as a consequence?MSNBC From ACM Opinion | June 12, 2012
Two weeks ago, when we announced the discovery of the Flame malware we said that we saw no strong similarity between its code and programming style with that of ...Kaspersky Lab From ACM News | June 11, 2012