Revisiting the need to educate professionals to defend against malware in its various guises.George Ledin From Communications of the ACM | February 1, 2011
How much are consumers willing to pay for broadband service? Our research estimates consumer willingness-to-pay...Gregory Rosston, Scott Savage, Donald Waldman From Communications of the ACM | February 1, 2011
Cyberterrorism is a concept that appears recurrently in contemporary media. This coverage is particularly interesting...Maura Conway From Communications of the ACM | February 1, 2011
This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the prying eyes ofreported...Electronic Frontier Foundation From ACM News | January 24, 2011
Can I let you in on a secret? Typing two spaces after a period is totally, completely, utterly, and inarguably wrong. And yet people who use two spaces are everywhere...Slate From ACM Opinion | January 20, 2011
With Steve Jobs' third medical-related absence in six years, Silicon Valley must again confront one of its great mysteries: How much does Jobs matter to Apple?San Jose Mercury News From ACM Opinion | January 18, 2011
Through the gates of Fort George Meade pass the most powerful technical minds that the government employs. But Fort Meade's website contains pixelized, faux-shaded...Wired From ACM News | January 12, 2011
Professor P.K. Kannan at the University of Maryland, says the success of the iPhone 4 released by Verizon boils down to one word: "performance. That is, the performance...niversity of Maryland, College Park From ACM Opinion | January 12, 2011
A year ago, Steve Ballmer took the stage of the Consumer Electronics Show to tout a technology that he promised would change the world: the Windows operating...Slate From ACM Opinion | January 10, 2011
Here is how Jon Leibowitz, chairman of the U.S. Federal Trade Commission, describes the current state of affairs on the Internet: "Say I’m walking through a mall...Newsweek From ACM Opinion | January 4, 2011
Seeking to improve the educational mechanisms for efficiently training large numbers of information security workers.Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou From Communications of the ACM | January 1, 2011
Privacy and confidentiality issues in cloud-based conference management systems reflect more universal themes.Mark D. Ryan From Communications of the ACM | January 1, 2011
You want to know how to get my attention?" Jason Kalich asked the audience rhetorically. "First off, don't bring me a good...Phillip G. Armour From Communications of the ACM | January 1, 2011
"I'm aware of your need to stay anonymous, but I have to be able to describe the scope of this movement. Can any of you tell me where you're typing from?"The Economist From ACM Opinion | December 10, 2010
A truly free press—one unfettered by concerns of nationalism—is apparently a terrifying problem for elected governments and tyrannies alike.Wired From ACM Opinion | December 7, 2010
Behind the fly-off-the-shelf popularity of products like Apple's iPad and iPhone are hundreds of thousands of manufacturing jobs—mostly overseas. Is it possible...CNET From ACM News | December 6, 2010
If there were a Mt. Rushmore of computer gaming, John Carmack's head would not only be on it, it would have the highest polygon count.Arstechnica From ACM Opinion | December 3, 2010
There you are, peacefully reading an article or watching a video on the Internet. You finish, find it thought-provoking, and scroll down to the comments section...The New York Times From ACM News | November 30, 2010