Promoting more harmonious paths for technological innovators and expressive creators in the Internet age.Peter S. Menell From Communications of the ACM | May 1, 2012
The George W. Bush team must be consumed with envy. Britain's government is preparing sweeping new legislation that would let the country's domestic intelligence...The New York Times From ACM Opinion | April 16, 2012
Sometimes an IPO is more than just another IPO, and that's the case with Palo Alto Networks, which has just filed to go public.Bloomberg Businessweek From ACM Careers | April 11, 2012
The world was stunned by the first real look at Google's Project Glass. In a video released by the search giant, we got a a captivating look at how its glasses...ABC News From ACM Opinion | April 6, 2012
Over the past year, the U.S. government has begun to think of Anonymous, the online network phenomenon, as a threat to national security.Foreign Affairs From ACM Opinion | April 5, 2012
For the last two months, senior government officials and private-sector experts have paraded before Congress and described in alarming terms a silent threat: cyberattacks...The New York Times From ACM Opinion | April 3, 2012
When you "like" something on Facebook or read an online newspaper, perhaps a dozen or more companies are squirreling away data on your tastes, your habits, whether...Reuters From ACM Opinion | April 3, 2012
Information technology is changing the way nations wage war, with philosophical and ethical perspectives struggling to keep pace with those changes. The Atlantic From ACM TechNews | March 30, 2012
One fine night in November 2011 I got an opportunity to get my hands dirty, working on a project for the U.S. Federal Bureau of Investigation.CircleID From ACM Opinion | March 29, 2012
The assault on personal privacy has ramped up significantly in the past few years. From warrantless GPS tracking to ISP packet inspection, it seems that everyone...InfoWorld From ACM Opinion | March 28, 2012
In December, the U.S. Department of Justice intervened under the Voting Rights Act to stay a South Carolina voter ID law.CNN From ACM Opinion | March 26, 2012
Combining academic and industry representation, the NCWIT Pacesetters program works to increase the participation of girls and women in computing.Jill Ross, Elizabeth Litzler, J. McGrath Cohoon, Lucy Sanders From Communications of the ACM | April 1, 2012
There is a spate of proposed cybersecurity legislation working its way through the House and Senate. The bills are aimed primarily at facilitating cooperation regarding...Electronic Frontier Foundation From ACM Opinion | March 21, 2012