A recent case challenges the long-standing view that application program interfaces are not protectable under copyright law.
Pamela Samuelson From Communications of the ACM | March 1, 2015
Citizenfour is filmmaker Laura Poitras' account of the first meetings between herself, Glenn Greenwald, and Edward Snowden.Ars Technica From ACM Opinion | February 23, 2015
Technology giants often meet their end not with a bang but a whimper, a slow, imperceptible descent into irrelevancy that may not immediately be reflected in the...The New York Times From ACM Opinion | February 13, 2015
Gordon Moore's famous calculation of the gains in power and economy that would drive chip production continues to have profound implications for every enterprise...Medium From ACM Opinion | February 12, 2015
In the internet of things, the Federal Trade Commission sees the possibility of flourishing new markets. But it also sees a prologue to Black Mirror: in a new report...The Verge From ACM Opinion | February 12, 2015
For years, the federal government supported the principle of net neutrality: the idea that broadband providers should treat all Internet traffic the same.The New Yorker From ACM Opinion | February 9, 2015
The people clamoring for tough, new regulations for Internet service—everyone from net neutrality activists and a few blue-chip companies to President Obama and ...Bloomberg From ACM Opinion | February 5, 2015
After more than a decade of debate and a record-setting proceeding that attracted nearly 4 million public comments, the time to settle the Net Neutrality question...Wired From ACM Opinion | February 4, 2015
When Microsoft stock was at a record high in 1999, and its market capitalization was nearly $620 billion, the notion that Apple Computer would ever be bigger—let...The New York Times From ACM Opinion | January 30, 2015
Comparing experiences publishing textbooks using traditional publishers and do-it-yourself methods.Armando Fox, David Patterson From Communications of the ACM | February 1, 2015
A proposal for a framework for code requirements addressing primary sources of vulnerabilities for building systems.Carl Landwehr From Communications of the ACM | February 1, 2015