A case before the European Court of Justice has significant implications for innovation and competition in the software industry.Pamela Samuelson From Communications of the ACM | March 1, 2012
Considering the basic ethical questions that must be resolved in the new realm of cyberwarfare.Patrick Lin, Fritz Allhoff, Neil C. Rowe From Communications of the ACM | March 1, 2012
Apple has no problem getting Chinese consumers to desire its products, as a near-riot outside its Beijing store showed in January. But the U.S. tech giant has been...Slate From ACM Opinion | February 21, 2012
The seeds of LightSquared's failure to win government clearance to build a 4G-LTE network can, ironically, be found in the "approval" the company received just...Arstechnica From ACM Opinion | February 21, 2012
What happens when you click on a Weblink? Here's one answer: A request goes from your computer to a server identified by the URL of the desired link. The server...The Guardian From ACM Opinion | February 21, 2012
Four months after I walked into a lab at Harvard University and gave a vial of blood to have my genome sequenced, my search to understand my DNA led me to Mark...Bloomberg Businessweek From ACM Opinion | February 21, 2012
Last year, the level and ferocity of cyberattacks on the Internet reached such a horrendous level that some are now thinking the unthinkable: let the Internet wither...BBC News From ACM Opinion | February 20, 2012
Apple's iPhones and iPads get most of the attention, but Apple is now directing the spotlight on the Mac.The New York Times From ACM Opinion | February 17, 2012
LightSquared may have had a great case for building its wireless network, but the fledgling company lacked the political tact to see it through.CNET From ACM Opinion | February 17, 2012
Back in 2006, before the Obama administration made leak prosecutions routine, a panel of three federal appeals court judges in New York struggled to decide whether...The New York Times From ACM Opinion | February 16, 2012
First, the bad news: A small number of active RSA public encryption keys, a popular type of encryption protocol that secures billions of online transactions, offer...Bloomberg Businessweek From ACM Opinion | February 16, 2012
The morning after Jeremy Lin sank a thrilling, last-second three-pointer that lifted the New York Knicks over the Toronto Raptors and gave "Linsanity" its latest...The Wall Street Journal From ACM Opinion | February 16, 2012
It was the holy grail of investors. The Black-Scholes equation, brainchild of economists Fischer Black and Myron Scholes, provided a rational way to price a financial...The Guardian From ACM Opinion | February 14, 2012
In last month's State of the Union address, President Obama called on Congress to pass "legislation that will secure our country from the growing dangers of cyber...Wired From ACM Opinion | February 14, 2012
In a recent briefing to Congress about worldwide threats, FBI Director Robert S. Mueller III said that the danger of cyberattacks will equal or surpass the danger...The Washington Post From ACM Opinion | February 13, 2012
David Weinberger has a new book out entitled Too Big to Know in which he argues that one of the implications of a comprehensively networked society is that the...The Guardian From ACM Opinion | February 13, 2012
All indicators suggest Apple will unveil the iPad 3 during the first week of March. That’s less than a month away, and sources at The Next Web say Apple is in "crunch...Wired From ACM Opinion | February 13, 2012