Human conflict is often associated with the emergence of a new science or technology. The Civil War's Gatling gun changed battlefield tactics and led to modern...Slate From ACM News | September 13, 2011
After racing and biking back roads on the San Francisco Peninsula for almost half a century without serious incident, on July 3 I crashed while riding downhill...The New York Times From ACM News | September 12, 2011
Somewhere between Sept. 11 and today, the enemy morphed from a handful of terrorists to the American population at large, leaving us nowhere to run and no place...Politico From ACM Opinion | September 9, 2011
Revelations of wholesale electronic fraud and massive data heists have become weekly, even daily affairs.Foreign Policy From ACM Opinion | September 7, 2011
The Electronic Frontier Foundation urged the 9th U.S. Circuit Court of Appeals yesterday to preserve lawsuits challenging the government's illegal mass surveillance...The Electronic Frontier Foundation From ACM Opinion | September 1, 2011
The technology in question starts with "gigapixel" photography. Gigapixel photos are giant panoramas that themselves consist of hundreds of component mega-pixel...The Atlantic From ACM Opinion | August 31, 2011
How social media are expanding traditional research and development topics for computer and information scientists.Ben Shneiderman, Jennifer Preece, Peter Pirolli From Communications of the ACM | September 1, 2011
Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.Peter J. Denning, Ritu Raj From Communications of the ACM | September 1, 2011
How to improve IT outsourcing relationships while doing good for society.
Ron Babin, Steve Briggs, Brian Nicholson From Communications of the ACM | September 1, 2011
Sixty years ago, Maurice Wilkes, David Wheeler, and Stanley Gill produced the first textbook on programming: The Preparation of Programs for an Electronic Digital...Martin Campbell-Kelly From Communications of the ACM | September 1, 2011
Assessing the threat the anticircumvention provisions of the Digital Millennium Copyright Act pose for fair use.Rebecca Tushnet From Communications of the ACM | September 1, 2011
I've lost track of the number of people who've asked me to comment on David Cameron's insane plan to cripple Britain's Internet in times of civil unrest by blocking...The Guardian From ACM Opinion | August 17, 2011
Before we get to that, there's a clue in the spelling of the word: cyberwar instead of cyber war. The U.S. Defense Department has determined that cyber is a fifth...Slate From ACM Opinion | August 16, 2011
The Electronic Frontier Foundation, in collaboration with the Tor Project, has launched an official 1.0 version of HTTPS Everywhere, a tool for the Firefox Web...Electronic Frontier Foundation From ACM News | August 5, 2011
Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...China Daily From ACM News | August 5, 2011
Evgeny Kaspersky is one of Russia's top Internet virus hunters. In an interview, he discusses a raft of recent hacker attacks on multinationals, the "total professionals"...Spiegel Online From ACM Opinion | July 26, 2011
Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...The New York Times From ACM News | July 26, 2011
It's time to re-examine how we use, or overuse, the words "hack" and "hacker." They're relied on far too often to describe all kinds of activities that don't...Fast Company From ACM Opinion | July 25, 2011