Researchers in the Netherlands have just demonstrated that the quantum teleportation of information is now possible.The Washington Post From ACM Opinion | June 5, 2014
Three computer bugs this year exposed passwords, e-mails, financial data, and other kinds of sensitive information connected to potentially billions of people.Technology Review From ACM Opinion | June 5, 2014
Last month, Attorney General Eric Holder announced that the United States was charging members of the Chinese military with economic espionage.The New Yorker From ACM Opinion | June 5, 2014
Robots may be poised to enter a new frontier in the workplace—but that doesn't mean the public is ready for it.The Wall Street Journal From ACM Opinion | June 3, 2014
As any historian, psychologist, sociologist, or scientist will tell you, the truth of an idea has very little to do with how fast it spreads and how well it's believed...Slate From ACM Opinion | June 2, 2014
At first glance, the Justice Department's 31-count indictment of five Chinese military officers for hacking into the computers of six American corporations, in...Slate From ACM Opinion | June 2, 2014
The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization...The Washington Post From ACM Opinion | May 30, 2014
We've all seen those movies where someone goes back in time and tries to change something (the classic "Grandfather Paradox": what happens if you go back in time...Scientific American From ACM Opinion | May 28, 2014
What lessons might we learn from the chip cards used for payments in Europe, now that the U.S. is adopting them too?
Ross Anderson, Steven J. Murdoch From Communications of the ACM | June 1, 2014
My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation...The Guardian From ACM Opinion | May 22, 2014
There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose...The Atlantic From ACM Opinion | May 21, 2014
This spring, the Federal Communications Commission is deciding how to regulate the "Open Internet"—a term it uses to refer to the movement for net neutrality.Slate From ACM Opinion | May 21, 2014
In "On What We Can Not Do," a short and pungent essay published a few years ago, the Italian philosopher Giorgio Agamben outlined two ways in which power operates...The New York Times From ACM Opinion | May 21, 2014
In July of 2008, Dylan Breves, then a seventeen-year-old student from New York City, made a mundane edit to a Wikipedia entry on the coati.The New Yorker From ACM Opinion | May 20, 2014
The Internet has much to say about the recent ruling by the Court of Justice of the European Union, which determines that if a person wants some personal information...Bloomberg Businessweek From ACM Opinion | May 19, 2014