Comparing experiences publishing textbooks using traditional publishers and do-it-yourself methods.Armando Fox, David Patterson From Communications of the ACM | February 1, 2015
A proposal for a framework for code requirements addressing primary sources of vulnerabilities for building systems.Carl Landwehr From Communications of the ACM | February 1, 2015
During one scene in the upcoming hacker action movie Blackhat, a team is sent into the control room of a burned-out nuclear power plant to gather clues about the...Ars Technica From ACM Opinion | January 16, 2015
The Turing Award gives us a unique opportunity to become ambassadors of our wonderful field. It increases our outside visibility and enables us to build bridges...Silvio Micali From Communications of the ACM | January 1, 2015
Searching for an answer to the question of how much responsibility search engine operators should bear for privacy-related issues connected to search engine results...Lee A. Bygrave From Communications of the ACM | January 1, 2015
Considering the evolving relationship between established companies and their sharing-economy counterparts.Michael A. Cusumano From Communications of the ACM | January 1, 2015
Earlier this month, a mysterious group that calls itself Guardians of Peace hacked into Sony Pictures Entertainment’s computer systems and began revealing many...The Wall Street Journal From ACM Opinion | December 19, 2014