Guidelines for the enterprise.
Maja Vukovic, Jim Laredo, Vinod Muthusamy, Aleksander Slominski, Roman Vaculin, Wei Tan, Vijay Naik, Ignacio Silva-Lepe, Arun Kumar, Biplav Srivastava, Joel W. Branch From Communications of the ACM | March 1, 2016
In addition to alliances created for broadening participation in computing, research is required to better utilize the knowledge they have produced.Tiffany Barnes, George K. Thiruvathukal From Communications of the ACM | March 1, 2016
A recent celebration of 50 years of operating system research yields lessons for all professionals in designing offers for their clients.Peter J. Denning From Communications of the ACM | March 1, 2016
The skirmish between Apple and the FBI is quickly escalating to a battle royal, a fight to the finish over lofty principles and national values, involving not just...Slate From ACM Opinion | February 24, 2016
Each summer, the computer-science researchers behind the world's best poker-playing robots bring their creations together for a tournament.The Atlantic From ACM Opinion | February 22, 2016
"Are you sure they're there?" the decision maker asks. "They" are Qaeda operatives who have been planning attacks against the United States.The New York Times From ACM Opinion | February 22, 2016
The high-stakes stalemate between Apple and the Justice Department isn’t the first time that Washington and Silicon Valley have come to a showdown over security...The Wall Street Journal From ACM Opinion | February 22, 2016
The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and...Wired From ACM News | February 19, 2016
The most striking aspect of Apple's message to customers on Tuesday wasn't the rejection of U.S. authorities' demand that the company help them break the encryption...Bloomberg View From ACM Opinion | February 17, 2016
We learned on Tuesday evening that a U.S. federal magistrate judge ordered Apple to backdoor an iPhone that was used by one of the perpetrators of the San Bernardino...The Electronic Frontier Foundation From ACM Opinion | February 17, 2016
Some people are already used to having their personal information exposed in massive data breaches.The Washington Post From ACM Opinion | February 12, 2016
The end of White House terms are often about trying to shape historic legacies, and President Obama is out to build his in the new area of cybersecurity.Wired From ACM Opinion | February 11, 2016
Congress could soon vote on a bill that would require law enforcement agencies to get a search warrant from a judge to obtain emails, photographs and other documents...The New York Times From ACM Opinion | February 10, 2016
Software is already pervasive in our society, but artificial intelligence software raises unique concerns even among the technological elite.Recode From ACM Opinion | February 5, 2016
A defining moment in modern biology occurred on July 24, 1978, when biotechnology pioneer Robert Swanson, who had recently co-founded Genentech, brought two young...Scientific American From ACM Opinion | February 5, 2016
Sooner or later everything seems to go online. Newspapers. TV. Radio. Shopping. Banking. Dating.Scientific American From ACM Opinion | February 3, 2016