A proposal for a framework for code requirements addressing primary sources of vulnerabilities for building systems.Carl Landwehr From Communications of the ACM | February 1, 2015
During one scene in the upcoming hacker action movie Blackhat, a team is sent into the control room of a burned-out nuclear power plant to gather clues about the...Ars Technica From ACM Opinion | January 16, 2015
The Turing Award gives us a unique opportunity to become ambassadors of our wonderful field. It increases our outside visibility and enables us to build bridges...Silvio Micali From Communications of the ACM | January 1, 2015
Searching for an answer to the question of how much responsibility search engine operators should bear for privacy-related issues connected to search engine results...Lee A. Bygrave From Communications of the ACM | January 1, 2015
Considering the evolving relationship between established companies and their sharing-economy counterparts.Michael A. Cusumano From Communications of the ACM | January 1, 2015
Earlier this month, a mysterious group that calls itself Guardians of Peace hacked into Sony Pictures Entertainment’s computer systems and began revealing many...The Wall Street Journal From ACM Opinion | December 19, 2014
Space is big. Really big. And not just in terms of the mind-boggingly vast distances between the stars and planets out there in the Universe at large.BBC News From ACM Opinion | December 17, 2014
A little over a year ago, I was lucky enough to take a short ride in a Folland Gnat trainer—a nimble little two-seat jet maintained by Rick Sharpe of Houston's ...Ars Technica From ACM Opinion | December 16, 2014
A few years ago, the most enthusiastic advocates of MOOCs believed that these "massive open online courses" stood poised to overturn the century-old model of higher...Technology Review From ACM Opinion | December 15, 2014
Even if you're a devoted fan of video games, there's a decent chance you're not familiar with the name Ralph H. Baer.Ars Technica From ACM Opinion | December 8, 2014