As mobile devices continue to explore and colonize the technology landscape, their conquests are leading us to a new era, beyond search and apps.TechCrunch From ACM Opinion | August 21, 2015
Twenty years ago I attended my first Def Con. I believed in a free, open, reliable, interoperable Internet: a place where anyone can say anything, and anyone who...Medium From ACM Opinion | August 20, 2015
From a viewing spot in a high bay room at NASA Ames Research Center in Silicon Valley, I peer through a glass window at a cab that simulates the cockpit of a commercial...Ars Technica From ACM Opinion | August 19, 2015
Last month over a thousand scientists and tech-world luminaries, including Elon Musk, Stephen Hawking and Steve Wozniak, released an open letter calling for a global...The New York Times From ACM Opinion | August 18, 2015
Unfortunately, much of the recent outcry against artificial-intelligence weapons has been confused, conjuring robot takeovers of mankind.The Atlantic From ACM Opinion | August 17, 2015
In the build up to the 2016 U.S. election, both Democratic and Republican presidential hopefuls are talking about cybersecurity—and specifically state-sponsored...Wired From ACM Opinion | August 14, 2015
In June, a father of six was shot dead on a Monday afternoon in Evanston, Ill., a suburb 10 miles north of Chicago.The New York Times From ACM Opinion | August 12, 2015
Shortly after its founding, Google posted a document on its site called "Ten things we know to be true," an effort to distill its unusual corporate culture into...The New York Times From ACM Opinion | August 11, 2015
More than a year ago, in a decision that stunned many American Internet companies, Europe's highest court ruled that search engines were required to grant an unusual...The New York Times From ACM Opinion | August 6, 2015
In a landmark ruling in May 2014, the Court of Justice of the European Union (CJEU) established a "right to be forgotten", or more accurately, a "right to delist"...Google From ACM Opinion | July 30, 2015
When the history of the connected car is written, this week may go down as a pivotal moment for consumers worried about security.The New York Times From ACM Opinion | July 24, 2015
Improving learning and achievement in introductory computer science by incorporating creative thinking into the curriculum.Leen-Kiat Soh, Duane F. Shell, Elizabeth Ingraham, Stephen Ramsay, Brian Moore From Communications of the ACM | August 1, 2015
Two studies provide insights into how to increase the number of domestic doctoral students in U.S. computer science programs.
Susanne Hambrusch, Ran Libeskind-Hadas, Eric Aaron From Communications of the ACM | August 1, 2015
Seeking a better approach to pharmaceutical research and development.Henry Chesbrough, Marshall Van Alstyne From Communications of the ACM | August 1, 2015
Designers and developers of healthcare information technologies must address preexisting security vulnerabilities and undiagnosed future threats.David Kotz, Kevin Fu, Carl Gunter, Avi Rubin From Communications of the ACM | August 1, 2015
Think of Edward Snowden's vast leaks as a how-to guide for head-choppers looking to keep their own heads far from U.S. bombs.New York Daily News From ACM Opinion | July 22, 2015