Take a look around you. The walls, the chair you're sitting in, your own body—they all seem real and solid. Yet there is a possibility that everything we see...New Scientist From ACM Opinion | July 28, 2011
Twitter users have a way of self-identifying gratuitous complaints they make. They use the hashtag first-world problems. As in, "I can't believe Netflix is doubling...DesMoinesRegister.com From ACM Opinion | July 27, 2011
University of Alabama at Birmingham social psychologist Rex A. Wright explains why some people do not view phone hacking as unethical and why those that see it...niversity of Alabama at Birmingham From ACM Opinion | July 27, 2011
It's time to re-examine how we use, or overuse, the words "hack" and "hacker." They're relied on far too often to describe all kinds of activities that don't...Fast Company From ACM Opinion | July 25, 2011
Openness is the Internet's great strength—and weakness. With powerful forces carving it up, is its golden age coming to an end?New Scientist From ACM News | July 21, 2011
When we think of being connected to the Internet, our minds immediately shift to our computers, phones, and most recently tablets. This week at Cisco live, I...Cisco Systems From ACM Opinion | July 20, 2011
Leadership is a core competency of the officers, warrant officers, and non-commissioned officers across the military services. A principle tenant of leadership...Small Wars Journal From ACM Opinion | July 20, 2011
The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice...Joseph Y. Halpern, David C. Parkes From Communications of the ACM | August 1, 2011
An assessment of the U.S. government's EINSTEIN project.S. M. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford From Communications of the ACM | August 1, 2011
The nation’s second-ranking military official said Thursday that the U.S. approach to protecting its computer systems was "too predictable" and failed to penalize...The Washington Post From ACM News | July 15, 2011
South Korea will ban school paper textbooks and replace them with electronic tablets by 2014, which should alarm other nations. South Korea's students ranked No...The Miami Herald From ACM Opinion | July 14, 2011
In a speech at the International Economic Association 16th World Congress in Beijing, Andrew Haldane, Executive Director for Financial Stability and member of...Bank of England From ACM News | July 13, 2011
The United States may seriously want to consider creating a new Internet infrastructure to reduce the threat of cyberattacks, said Michael Hayden, President George...NextGov From ACM News | July 12, 2011
The history of Internet security is both worrisome and instructive. When the first virus — the "Morris worm"—was launched in 1988, the Internet was a closed system...The Washington Post From ACM Opinion | July 11, 2011
The Supreme Court ended its term with a high-profile ruling that violent video games are protected by the First Amendment, but a bigger technology decision could...Time From ACM News | July 11, 2011
Forty years ago, I wrote an article for Technology Review titled "Shall We Build the Space Shuttle?" Now, with the 135th and final flight of the shuttle at hand...Technology Review From ACM Opinion | July 6, 2011
Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your...Electronic Frontier Foundation From ACM News | June 27, 2011