What should Apple do with its $76bn in cash? It could do worse than spend some of it on acquiring its own mobile carrier.The Guardian From ACM Opinion | August 18, 2011
I've lost track of the number of people who've asked me to comment on David Cameron's insane plan to cripple Britain's Internet in times of civil unrest by blocking...The Guardian From ACM Opinion | August 17, 2011
Before we get to that, there's a clue in the spelling of the word: cyberwar instead of cyber war. The U.S. Defense Department has determined that cyber is a fifth...Slate From ACM Opinion | August 16, 2011
Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...China Daily From ACM News | August 5, 2011
Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...The New York Times From ACM News | July 26, 2011
Leadership is a core competency of the officers, warrant officers, and non-commissioned officers across the military services. A principle tenant of leadership...Small Wars Journal From ACM Opinion | July 20, 2011
The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice...Joseph Y. Halpern, David C. Parkes From Communications of the ACM | August 1, 2011
An assessment of the U.S. government's EINSTEIN project.S. M. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford From Communications of the ACM | August 1, 2011
Amid all the job losses of the Great Recession, there is one category of worker that the economic disruption has been good for: nonhumans.Newsweek From ACM News | July 19, 2011
From Newt Gingrich to a Congressional "EMP Caucus," some conservatives warn the electronics-frying blast could pose gravely underestimated dangers to the U.S.The Atlantic From ACM Opinion | July 18, 2011
The nation’s second-ranking military official said Thursday that the U.S. approach to protecting its computer systems was "too predictable" and failed to penalize...The Washington Post From ACM News | July 15, 2011
The United States may seriously want to consider creating a new Internet infrastructure to reduce the threat of cyberattacks, said Michael Hayden, President George...NextGov From ACM News | July 12, 2011
The history of Internet security is both worrisome and instructive. When the first virus — the "Morris worm"—was launched in 1988, the Internet was a closed system...The Washington Post From ACM Opinion | July 11, 2011
The Supreme Court ended its term with a high-profile ruling that violent video games are protected by the First Amendment, but a bigger technology decision could...Time From ACM News | July 11, 2011
Apple notched a significant win last week when it was awarded a key patent related to basic multitouch functionality. The patent was first called "hugely problematic"...GigaOm From ACM Opinion | June 29, 2011
Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your...Electronic Frontier Foundation From ACM News | June 27, 2011
After just 50 days, the group said it was ceasing individual operations. Why, when you might have thought things were going so well?The Guardian From ACM Opinion | June 27, 2011