In justifying U.S. involvement in Libya, the Obama administration cited the "responsibility to protect" citizens of other countries when their governments engage...The Wall Street Journal From ACM Opinion | June 20, 2011
Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...Symantec From ACM News | June 17, 2011
Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...CNET From ACM News | June 15, 2011
When Colin Hughes was about 11 years old his parents brought home a rather strange toy. It wasn't colorful or cartoonish; it didn't seem to have any lasers or...The Atlantic From ACM Opinion | June 14, 2011
Online piracy is a huge business. A recent study found that Web sites offering pirated digital content or counterfeit goods, like illicit movie downloads or bootleg...The New York Times From ACM Opinion | June 10, 2011
When Jeff Moss, popularly known as the Dark Tangent, started holding underground hacker conferences in Las Vegas he knew he had a problem. All previous gatherings...The Guardian From ACM Opinion | June 6, 2011
NASA is no longer sending commands to the Spirit rover on Mars, but the long-silent robot still has a few more chances to phone home. Not that anyone is expecting...MSNBC From ACM News | June 1, 2011
The reauthorization of the Patriot Act looks like a forgone conclusion. But next month, a bipartisan band of legislators will try to mitigate a different kind...Wired From ACM News | May 31, 2011
What's next for Microsoft Windows? With Windows 7 now 19 months old, plenty of people are curious about its successor, a product that everybody's calling Windows...Time From ACM Opinion | May 27, 2011
In this era of Big Data, there is little that cannot be tracked in our online lives—or even in our offline lives. Consider one new Silicon Valley venture, called...Technology Review From ACM Opinion | May 26, 2011
Good software design is never easy, but stopping too soon makes the job more difficult.David Lorge Parnas From Communications of the ACM | June 1, 2011
One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...Phillip G. Armour From Communications of the ACM | June 1, 2011
Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.
Peter J. Denning, Dennis J. Frailey From Communications of the ACM | June 1, 2011
Jaron Lanier, a partner architect at Microsoft Research, has had a long and varied career in technology. Mr. Lanier popularized the term "virtual reality" in...The New York Times From ACM Opinion | May 23, 2011
One of the joys of the last few years has been the flood of real-world data sets being released by all sorts of organizations. These usually involve some record...O'Reilly Radar From ACM News | May 18, 2011
When you look back at the past 50 years of human spaceflight, don't forget the computer scientists who helped make it possible.MSNBC From ACM News | May 16, 2011
A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...The New York Times From ACM Opinion | May 10, 2011
As long as it took to find and kill Osama bin Laden after the terrorist attacks on New York and Washington, it has taken even longer to commemorate the thousands...The New Yorker From ACM Opinion | May 9, 2011
In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services...San Jose Mercury news From ACM News | May 6, 2011