As cloud computing becomes increasingly common, serious operational "meltdowns" could take place as end users and vendors mix, match, and bundle services for various...IDG News Service From ACM TechNews | June 14, 2012
That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.The New York Times From ACM News | June 12, 2012
Another day, another senior al-Qaeda leader killed by a drone strike. (I can't be the first to point out that being al-Qaeda's No. 2 is like being the drummer for...Time From ACM Opinion | June 9, 2012
In 1945, the United States organized a committee to investigate whether nuclear weapons should become a central military technology, or whether to abjure the weapons...Bulletin of the Atomic Scientists From ACM Opinion | June 8, 2012
The National Spelling Bee of 2023 started out like any other, but controversy enveloped the contest when Suzy Hamilton, an 8-year-old from Tulsa, emerged as the...The Wall Street Journal From ACM News | June 7, 2012
In the last week or so, cyberwarfare has made front-page news: the United States may have been behind the Stuxnet cyberattack on Iran; Iran may have suffered another...The Atlantic From ACM Opinion | June 6, 2012
In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...The New York Times From ACM Opinion | June 6, 2012
A couple of days ago, I received an e-mail from Iran. It was sent by an analyst from the Iranian Computer Emergency Response Team, and it was informing me about...Wired From ACM Opinion | June 1, 2012
Two weeks ago, Steve Wozniak made a public call for Apple to open its platforms for those who wish to tinker, tweak and innovate with their internals. EFF supports...Electronic Frontier Foundation From ACM Opinion | May 30, 2012
Should we worry about cyberwarfare? Judging by excessively dramatic headlines in the media, very much so. Cyberwarfare, the argument goes, might make wars easier...Slate From ACM Opinion | May 29, 2012
From all indications, it would appear that attackers are continuing to attack and malware authors are carrying on writing malware.Threatpost From ACM Opinion | May 29, 2012
If I were empress of the Universe I would insist on every individual having a unique ID permanently attached—a barcode if you will—an implanted chip to provide...BBC News From ACM Opinion | May 22, 2012
The patent world is quietly undergoing a change of seismic proportions. In a few short years, a handful of entities have amassed vast treasuries of patents on an...Stanford Technology Law Review From ACM News | May 8, 2012
It is ironic that Steve Jobs, the man who focused on building consumer-friendly devices such as the iPod, iPhone, and iPad, is also radically reshaping the business...Samuel Greengard From ACM News | May 8, 2012
It's hard to think of a more attention-grabbing title than "Robots, Men, and Sex Tourism"—especially in the academic world.Slate From ACM Opinion | May 4, 2012
We live in a technological universe in which we are always communicating. And yet we have sacrificed conversation for mere connection.The New York Times From ACM Opinion | May 4, 2012
At the end of April, Tor Books, the world's largest science fiction publisher, and its UK sister company, Tor UK, announced that they would be eliminating digital...The Guardian From ACM Opinion | May 3, 2012
Was Google's snooping on home Wi-Fi users the work of a rogue software engineer? Was it a deliberate corporate strategy? Was it simply an honest-to-goodness mistake...Slate From ACM Opinion | May 2, 2012
Three years ago, shortly after Microsoft announced that it would launch its own retail stores, I offered the company some unsolicited advice: Copy Apple "relentlessly...Slate From ACM Opinion | April 26, 2012