A proposal for a framework for code requirements addressing primary sources of vulnerabilities for building systems.Carl Landwehr From Communications of the ACM | February 1, 2015
Have you ever thought about why doorknobs are positioned at around two-fifths of the door's height, instead of right in the middle? Or why a washing machine is...Wired From ACM Opinion | January 22, 2015
During one scene in the upcoming hacker action movie Blackhat, a team is sent into the control room of a burned-out nuclear power plant to gather clues about the...Ars Technica From ACM Opinion | January 16, 2015
The tech industry once again can't decide: When it comes to the home of the future, will it have a centralized computer telling you when to mop floors, clean windows...CNET From ACM Opinion | January 14, 2015
Ross Ulbricht is finally getting his day in court, 15 months after plainclothes FBI agents grabbed him in the science fiction section of a San Francisco library...Wired From ACM Opinion | January 13, 2015
One of the best Twitter accounts inside the Beltway or out—belongs to former representativeJohn Dingell (D-Mich.), who announced his retirement with self-effacing...The Washington Post From ACM Opinion | January 12, 2015