One of the things that makes attackers dance around their basement lairs is finding unencrypted Web sessions.Threatpost From ACM Opinion | October 4, 2012
Americans should have no reasonable expectation of privacy over the location data stored by their mobile phone.Slate From ACM Opinion | October 3, 2012
To evaluate optimal patent protection for an invention, one has to consider both the cost of inventing and the cost of copying; the higher the ratio of the former...The Becker-Posner Blog From ACM Opinion | October 2, 2012
Google Chairman Eric Schmidt says Apple should have continued to use Google’s mapping application in iOS 6 instead of swapping it out for its poorly received home...AllThingsD From ACM News | September 27, 2012
"IPhone5 Launch Causes Riots" You'd expect to see headlines like this when consumers beat down doors and trample each other, yet these riots were in China, among...Bloomberg Businessweek From ACM Opinion | September 27, 2012
Who created the Internet and why should we care? These questions, so often raised during the Bush-Gore election in 2000, have found their way back into the political...The New York Times From ACM Opinion | September 27, 2012
Hugo Campos has a cardiac defibrillator implanted in his body. It sends data about his heart to his doctors and back to the manufacturer, but it takes days to get...Wired From ACM Opinion | September 27, 2012
The Mazda Raceway at Laguna Seca is a 2.2-mile asphalt roller coaster plunging and soaring across California's tawny Monterey highlands.The Wall Street Journal From ACM Opinion | September 25, 2012
There is a widening gulf between application developers and security decision makers inside the enterprise, and it’s starting to cost companies serious money.Threatpost From ACM Opinion | September 24, 2012
In April of 2010, Eric Schmidt delivered the keynote address at the conference of the American Society of News Editors in Washington, D.C. During the talk, thearticulate...The Atlantic From ACM Opinion | September 24, 2012
For the right to personal privacy to survive in America in this digital age, courts must be meticulous in applying longstanding privacy protections to new technology...The New York Times From ACM Opinion | September 24, 2012
Promoting a clock-free paradigm that fits everything learned about programming since Turing.Ivan Sutherland From Communications of the ACM | October 1, 2012
Understanding the technical and social fundamentals of the computing infrastructure is essential in the continuously evolving technological realm.Jean-François Blanchette From Communications of the ACM | October 1, 2012
Perhaps it was the "fog of simulation." But the scariest aspect of a U.S.-Iran war game staged this week was the way each side miscalculated the other’s responses—and...The Washington Post From ACM Opinion | September 21, 2012