If Iran's post-election uprising last summer was the world's first "Twitter revolution," the massive Jan. 12 earthquake in Haiti was the first "Twitter disaster...Foreign Policy From ACM Opinion | February 10, 2010
Here’s a typical “date night” with me and Hollywood: I don’t know what I want to see. Neither does Hollywood. But it bangs on my eyeballs and eardrums like Stanley...Wired From ACM Opinion | February 8, 2010
I like to think of myself as the Dick Cheney of the Browser Wars—an unyielding proponent of greater and greater hostilities between the developers working on Chrome...Slate From ACM Opinion | February 8, 2010
The company once known for its "don't be evil" motto is now in bed with the spy agency known for the mass surveillance of American citizens.
The National Security...Wired From ACM Opinion | February 5, 2010
The more, the better. That’s the fashionable recipe for nurturing new ideas these days. It emphasizes a kind of Internet-era egalitarianism that celebrates the...The New York Times From ACM Opinion | February 1, 2010
Hugh Griffiths is chair of the executive committee of the Campaign for Science & Engineering (CaSE) and chair in intelligent radar systems at University College...New Scientist From ACM Opinion | January 29, 2010
President of People's Daily Online He Jiazheng speaks on Internet freedom:
The Google-China dispute shows a strategic position change of the United States. In...People's Daily Online From ACM Opinion | January 27, 2010
Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such as Gmail, in a politically motivated attempt...CNN From ACM Opinion | January 26, 2010
Over the past 40 years, the US has been dominating the world Internet as the core technique holder with an inherent advantage of being the cradle of the Internet...China Daily From ACM Opinion | January 26, 2010
In his July 2009 Communications editor's letter "Open, Closed, or Clopen Access?", editor-in-chief Moshe Vardi addressed...Michel Beaudouin-Lafon From Communications of the ACM | February 1, 2010
Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.
Douglas Maughan From Communications of the ACM | February 1, 2010
Why it is difficult — but essential — to monitor the effectiveness of security technologies.M. Angela Sasse From Communications of the ACM | February 1, 2010
An early advocate of the Internet's culture of openness, computer scientist Jaron Lanier has written a new book in which he reconsiders that view and takes a more...The New York Times From ACM TechNews | January 14, 2010
A decade ago, America Online merged with Time Warner in a deal valued at a stunning $350 billion. It was then, and is now, the largest merger in American business...The New York Times From ACM Opinion | January 11, 2010
I can remember when I first thought seriously about Twitter. Last March, I was at the SXSW conference in Austin, Tex., where technology, media and music are mashed...The New York Times From ACM Opinion | January 7, 2010
Last week brought some bad news for mobile phone users. German security expert Karsten Nohl demonstrated how easy it is to eavesdrop on GSM-based (Global System...CNET From ACM Opinion | January 4, 2010
Forty years ago, in 1969, Neil Armstrong left footprints on the surface of the moon. It was an extraordinary accomplishment.
Also in 1969, with much less fanfare...Xconomy From ACM Opinion | December 28, 2009
Thanks to the Internet, this list of 100 incredible lectures in the areas of astronomy, biology, medicine, engineering, chemistry, physics, environment, and technology...BestCollegesOnline.com From ACM Opinion | December 22, 2009