I like to think of myself as the Dick Cheney of the Browser Wars—an unyielding proponent of greater and greater hostilities between the developers working on Chrome...Slate From ACM Opinion | February 8, 2010
The company once known for its "don't be evil" motto is now in bed with the spy agency known for the mass surveillance of American citizens.
The National Security...Wired From ACM Opinion | February 5, 2010
As you surely know, Google has accused China of hacking into its systems and is considering pulling out of China altogether. The U.S. government is taking this...ITworld.com From ACM Opinion | February 5, 2010
As they marvel at Apple’s new iPad tablet computer, the technorati seem to be focusing on where this leaves Amazon’s popular e-book business. But the much more...The New York Times From ACM Opinion | February 4, 2010
Google may have threatened to leave China in order to keep us all from concluding that "the cloud" can't be secured. But isn't that precisely what we should conclude...Computerworld From ACM Opinion | February 1, 2010
The more, the better. That’s the fashionable recipe for nurturing new ideas these days. It emphasizes a kind of Internet-era egalitarianism that celebrates the...The New York Times From ACM Opinion | February 1, 2010
Hugh Griffiths is chair of the executive committee of the Campaign for Science & Engineering (CaSE) and chair in intelligent radar systems at University College...New Scientist From ACM Opinion | January 29, 2010
I just read a post on another site from someone who calls himself (herself?), linux guru, and it made me ponder the following question: What is a Linux Guru? I've...DaniWeb From ACM Opinion | January 28, 2010
President of People's Daily Online He Jiazheng speaks on Internet freedom:
The Google-China dispute shows a strategic position change of the United States. In...People's Daily Online From ACM Opinion | January 27, 2010
Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such as Gmail, in a politically motivated attempt...CNN From ACM Opinion | January 26, 2010
Over the past 40 years, the US has been dominating the world Internet as the core technique holder with an inherent advantage of being the cradle of the Internet...China Daily From ACM Opinion | January 26, 2010
Michael O. Rabin, co-recipient of the 1976 ACM A.M. Turing Award, discusses his innovative algorithmic work with Dennis Shasha.Dennis Shasha, Michael Rabin From Communications of the ACM | February 1, 2010
In his July 2009 Communications editor's letter "Open, Closed, or Clopen Access?", editor-in-chief Moshe Vardi addressed...Michel Beaudouin-Lafon From Communications of the ACM | February 1, 2010
Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.
Douglas Maughan From Communications of the ACM | February 1, 2010
Why it is difficult — but essential — to monitor the effectiveness of security technologies.M. Angela Sasse From Communications of the ACM | February 1, 2010
After fizzling out over the past couple years, outsourcing is back in vogue. A new PricewaterhouseCoopers study shows outsourcing has roared back to life in the...Forbes.com From ACM Opinion | January 25, 2010
The Internet is awash in digital images depicting pretty much anything your imagination can conceive. Sometimes a Web site administrator or a business might want...LinuxInsider From ACM Opinion | January 22, 2010