A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...The New York Times From ACM Opinion | May 10, 2011
In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services...San Jose Mercury news From ACM News | May 6, 2011
It's time for a major change in the way our personal, private data is handled. We need to take back our data from companies that are unwilling and unable to protect...ZDNet From ACM Opinion | May 5, 2011
Sony's apparent difficulty in figuring out the extent of the damage from the recent intrusion into its PlayStation Network, while frustrating for those affected...Computerworld From ACM Opinion | April 28, 2011
Last Thursday morning around 5 a.m. eastern time, Amazon suffered a major data center outage. These sorts of outages happen now and then, but they seldom makewhy...Slate From ACM Opinion | April 27, 2011
Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...The New York Times From ACM Opinion | April 25, 2011
Highlighting the significance of the often overlooked underlying software used to produce research results.Juan A. Añel From Communications of the ACM | May 1, 2011
In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...Tim Wu From Communications of the ACM | May 1, 2011
Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.Brian Dorn From Communications of the ACM | May 1, 2011
Studying how privacy regulation might impact economic activity on the advertising-supported Internet.Avi Goldfarb, Catherine E. Tucker From Communications of the ACM | May 1, 2011
The most dubious phrase in English after "act natural" is "trust me." A party asking for trust without offering a reason why is probably untrustworthy. And yet...The Economist From ACM Opinion | April 15, 2011
You probably know that some Internet and cell phone applications like Foursquare or Twitter can broadcast your location to the world. And you might know that...MSNBC From ACM News | April 15, 2011
Strategic theorists frequently lament that military planners are very effective at preparing for the last war, not the next one. Planners today must cope with...Strategic Studies Quarterly From ACM Opinion | April 1, 2011
Since the beginning of the debate on network neutrality, and perhaps as an inheritance of that beginning, the controversy has been restricted...José Luis Gómez-Barroso, Claudio Feijóo From Communications of the ACM | April 1, 2011
Programming is a creative endeavor, and therefore there is such a thing as coder's block. What does it take to clear the blockage?George V. Neville-Neil From Communications of the ACM | April 1, 2011
Reflections on recruiting and training programmers during the early period of computing.Nathan Ensmenger From Communications of the ACM | April 1, 2011