For this summer's reading list, we bring you seven very different types of books that have been published since the start of the year, each of them exploring the...The Washington Post From ACM Opinion | May 27, 2014
Computing technology has generated conditions for radical transformations of jobs and professions — including education. How shall we cope?Peter J. Denning From Communications of the ACM | June 1, 2014
Relying on dubious claims can cause researchers to focus on the wrong questions and organizations to misdirect security spending.
Dinei Florêncio, Cormac Herley, Adam Shostack From Communications of the ACM | June 1, 2014
What lessons might we learn from the chip cards used for payments in Europe, now that the U.S. is adopting them too?
Ross Anderson, Steven J. Murdoch From Communications of the ACM | June 1, 2014
My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation...The Guardian From ACM Opinion | May 22, 2014
There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose...The Atlantic From ACM Opinion | May 21, 2014
This spring, the Federal Communications Commission is deciding how to regulate the "Open Internet"—a term it uses to refer to the movement for net neutrality.Slate From ACM Opinion | May 21, 2014
In "On What We Can Not Do," a short and pungent essay published a few years ago, the Italian philosopher Giorgio Agamben outlined two ways in which power operates...The New York Times From ACM Opinion | May 21, 2014
In July of 2008, Dylan Breves, then a seventeen-year-old student from New York City, made a mundane edit to a Wikipedia entry on the coati.The New Yorker From ACM Opinion | May 20, 2014
The Internet has much to say about the recent ruling by the Court of Justice of the European Union, which determines that if a person wants some personal information...Bloomberg Businessweek From ACM Opinion | May 19, 2014
The National Security Agency might be tracking your phone calls. But private industry is prying far more deeply into your life.Politico From ACM Opinion | May 16, 2014
In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...Technology Review From ACM News | May 16, 2014
Re "Reading, Writing, Arithmetic and Now Coding" (front page, May 11): Schools and parents are really off the mark in introducing coding (and technology in general)...The New York Times From ACM Opinion | May 16, 2014