Many proposed solutions to the species-threatening transformations born of human industrialization have an engineering orientation. Often the suggested remedies...R. T. Watson, J. Corbett, M. C. Boudreau, J. Webster From Communications of the ACM | July 1, 2012
Considering the legal responsibilities of Internet intermediaries in the aftermath of the Stop Online Privacy Act controversy.Pamela Samuelson From Communications of the ACM | July 1, 2012
On June 18, Microsoft beckoned 200 or so members of the media to a grimy, industrial part of Hollywood for what it described as a can’t-miss affair.Bloomberg Businessweek From ACM Opinion | June 20, 2012
Here's a question: if you connect an unprotected Windows computer to the Internet, how long will it take before it is infected by malicious software?The Guardian From ACM Opinion | June 19, 2012
When the news about the Flame malware first broke several weeks ago, people from all parts of the security community, political world and elsewhere quickly began...Threatpost From ACM Opinion | June 18, 2012
Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...Forbes From ACM Opinion | June 18, 2012
If you're an experienced computer user, you probably remember explaining to newbies how a desktop computer worked: Your photos should go in this folder; your documents...The New York Times From ACM Opinion | June 15, 2012
Ross Miller made a good point about Apple's new flagship laptop, in his review for the Verge. Once you take into account that it has a solid-state drive, it's actually...Reuters From ACM Opinion | June 15, 2012
That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.The New York Times From ACM News | June 12, 2012
Despite the massive amounts of computing power dedicated by search engine companies to crawling and indexing trillions of documents on the Internet, search engines...Arstechnica From ACM Opinion | June 8, 2012
In the last week or so, cyberwarfare has made front-page news: the United States may have been behind the Stuxnet cyberattack on Iran; Iran may have suffered another...The Atlantic From ACM Opinion | June 6, 2012
In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...The New York Times From ACM Opinion | June 6, 2012
In his 2011 State of the Union Address, President Obama declared, "This is our generation's Sputnik moment." Sputnik was the satellite that the Soviets had launched...Slate From ACM Opinion | June 4, 2012
Two weeks ago, Steve Wozniak made a public call for Apple to open its platforms for those who wish to tinker, tweak and innovate with their internals. EFF supports...Electronic Frontier Foundation From ACM Opinion | May 30, 2012
Should we worry about cyberwarfare? Judging by excessively dramatic headlines in the media, very much so. Cyberwarfare, the argument goes, might make wars easier...Slate From ACM Opinion | May 29, 2012
If you write about genetics and evolution, one of the commonest questions you are likely to be asked at public events is whether human evolution has stopped.The Wall Street Journal From ACM Opinion | May 29, 2012
So I guess you've heard about the recent initial public offering that didn't turn out the way it was supposed to. The company's Wall Street advisers misjudged the...The New York Times From ACM Opinion | May 29, 2012