You probably use voice recognition technology already, if in a limited capacity. Maybe you use Google's voice-activated search, or take advantage of its (somewhat...Technology Review From ACM News | July 27, 2011
Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...The New York Times From ACM News | July 26, 2011
Five years ago this month, Twitter opened itself up to the public. The new service, initially called Twttr, was born out of software engineer Jack Dorsey's fascination...Slate From ACM Opinion | July 22, 2011
Openness is the Internet's great strength—and weakness. With powerful forces carving it up, is its golden age coming to an end?New Scientist From ACM News | July 21, 2011
When we think of being connected to the Internet, our minds immediately shift to our computers, phones, and most recently tablets. This week at Cisco live, I...Cisco Systems From ACM Opinion | July 20, 2011
Leadership is a core competency of the officers, warrant officers, and non-commissioned officers across the military services. A principle tenant of leadership...Small Wars Journal From ACM Opinion | July 20, 2011
The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice...Joseph Y. Halpern, David C. Parkes From Communications of the ACM | August 1, 2011
An assessment of the U.S. government's EINSTEIN project.S. M. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford From Communications of the ACM | August 1, 2011
Amid all the job losses of the Great Recession, there is one category of worker that the economic disruption has been good for: nonhumans.Newsweek From ACM News | July 19, 2011
From Newt Gingrich to a Congressional "EMP Caucus," some conservatives warn the electronics-frying blast could pose gravely underestimated dangers to the U.S.The Atlantic From ACM Opinion | July 18, 2011
MySpace fell from grace for several reasons. First, they sacrificed the service's integrity in pursuit of monetization. For those who remember, the user experience...Time From ACM Opinion | July 18, 2011
The nation’s second-ranking military official said Thursday that the U.S. approach to protecting its computer systems was "too predictable" and failed to penalize...The Washington Post From ACM News | July 15, 2011
A recent survey finds that with increasing reliance on cloud computing, IT executives are uncertain about the role of IT operations but also plan to invest in...ScienceLogic Inc. From ACM Opinion | July 14, 2011
The best social network you've (probably) never heard of is one-five-hundredth the size of Facebook. It has no video chat feature, it doesn't let you check in...Slate From ACM Opinion | July 13, 2011
In a speech at the International Economic Association 16th World Congress in Beijing, Andrew Haldane, Executive Director for Financial Stability and member of...Bank of England From ACM News | July 13, 2011
The United States may seriously want to consider creating a new Internet infrastructure to reduce the threat of cyberattacks, said Michael Hayden, President George...NextGov From ACM News | July 12, 2011
The history of Internet security is both worrisome and instructive. When the first virus — the "Morris worm"—was launched in 1988, the Internet was a closed system...The Washington Post From ACM Opinion | July 11, 2011