"Are you sure they're there?" the decision maker asks. "They" are Qaeda operatives who have been planning attacks against the United States.The New York Times From ACM Opinion | February 22, 2016
The high-stakes stalemate between Apple and the Justice Department isn’t the first time that Washington and Silicon Valley have come to a showdown over security...The Wall Street Journal From ACM Opinion | February 22, 2016
Without cheaper devices and more affordable broadband plans, universal Internet access won't be possible until 2042, according to a new report.CNET From ACM Opinion | February 22, 2016
The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and...Wired From ACM News | February 19, 2016
The most striking aspect of Apple's message to customers on Tuesday wasn't the rejection of U.S. authorities' demand that the company help them break the encryption...Bloomberg View From ACM Opinion | February 17, 2016
We learned on Tuesday evening that a U.S. federal magistrate judge ordered Apple to backdoor an iPhone that was used by one of the perpetrators of the San Bernardino...The Electronic Frontier Foundation From ACM Opinion | February 17, 2016
We have been following D-Wave's claims about its quantum hardware at Ars for a number of years. Over that time, my impression has oscillated between skepticism,...Ars Technica From ACM Opinion | February 16, 2016
Some people are already used to having their personal information exposed in massive data breaches.The Washington Post From ACM Opinion | February 12, 2016
A picture may be worth a thousand words, but the inverse is also true: A word is worth a thousand pictures.The Atlantic From ACM Opinion | February 11, 2016
The end of White House terms are often about trying to shape historic legacies, and President Obama is out to build his in the new area of cybersecurity.Wired From ACM Opinion | February 11, 2016
Congress could soon vote on a bill that would require law enforcement agencies to get a search warrant from a judge to obtain emails, photographs and other documents...The New York Times From ACM Opinion | February 10, 2016
One night in late July 2014, a journalist from the Chinese newspaper Southern Weeklyinterviewed a 17-year-old Chinese girl named Xiaoice (pronounced Shao-ice).Nautilus From ACM Opinion | February 9, 2016
Software is already pervasive in our society, but artificial intelligence software raises unique concerns even among the technological elite.Recode From ACM Opinion | February 5, 2016
A defining moment in modern biology occurred on July 24, 1978, when biotechnology pioneer Robert Swanson, who had recently co-founded Genentech, brought two young...Scientific American From ACM Opinion | February 5, 2016
Yesterday, the 46-year-old Google veteran who oversees its search engine, Amit Singhal, announced his retirement. And in short order, Google revealed that Singhal's...Wired From ACM Opinion | February 4, 2016
Sooner or later everything seems to go online. Newspapers. TV. Radio. Shopping. Banking. Dating.Scientific American From ACM Opinion | February 3, 2016