Researchers in the Netherlands have just demonstrated that the quantum teleportation of information is now possible.The Washington Post From ACM Opinion | June 5, 2014
Three computer bugs this year exposed passwords, e-mails, financial data, and other kinds of sensitive information connected to potentially billions of people.Technology Review From ACM Opinion | June 5, 2014
Last month, Attorney General Eric Holder announced that the United States was charging members of the Chinese military with economic espionage.The New Yorker From ACM Opinion | June 5, 2014
Robots may be poised to enter a new frontier in the workplace—but that doesn't mean the public is ready for it.The Wall Street Journal From ACM Opinion | June 3, 2014
As any historian, psychologist, sociologist, or scientist will tell you, the truth of an idea has very little to do with how fast it spreads and how well it's believed...Slate From ACM Opinion | June 2, 2014
At first glance, the Justice Department's 31-count indictment of five Chinese military officers for hacking into the computers of six American corporations, in...Slate From ACM Opinion | June 2, 2014
The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization...The Washington Post From ACM Opinion | May 30, 2014
We've all seen those movies where someone goes back in time and tries to change something (the classic "Grandfather Paradox": what happens if you go back in time...Scientific American From ACM Opinion | May 28, 2014
For this summer's reading list, we bring you seven very different types of books that have been published since the start of the year, each of them exploring the...The Washington Post From ACM Opinion | May 27, 2014
Computing technology has generated conditions for radical transformations of jobs and professions — including education. How shall we cope?Peter J. Denning From Communications of the ACM | June 1, 2014
Relying on dubious claims can cause researchers to focus on the wrong questions and organizations to misdirect security spending.
Dinei Florêncio, Cormac Herley, Adam Shostack From Communications of the ACM | June 1, 2014