Computing technology has generated conditions for radical transformations of jobs and professions — including education. How shall we cope?Peter J. Denning From Communications of the ACM | June 1, 2014
Relying on dubious claims can cause researchers to focus on the wrong questions and organizations to misdirect security spending.
Dinei Florêncio, Cormac Herley, Adam Shostack From Communications of the ACM | June 1, 2014
What lessons might we learn from the chip cards used for payments in Europe, now that the U.S. is adopting them too?
Ross Anderson, Steven J. Murdoch From Communications of the ACM | June 1, 2014
My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation...The Guardian From ACM Opinion | May 22, 2014
There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose...The Atlantic From ACM Opinion | May 21, 2014
This spring, the Federal Communications Commission is deciding how to regulate the "Open Internet"—a term it uses to refer to the movement for net neutrality.Slate From ACM Opinion | May 21, 2014
In "On What We Can Not Do," a short and pungent essay published a few years ago, the Italian philosopher Giorgio Agamben outlined two ways in which power operates...The New York Times From ACM Opinion | May 21, 2014
In July of 2008, Dylan Breves, then a seventeen-year-old student from New York City, made a mundane edit to a Wikipedia entry on the coati.The New Yorker From ACM Opinion | May 20, 2014
The Internet has much to say about the recent ruling by the Court of Justice of the European Union, which determines that if a person wants some personal information...Bloomberg Businessweek From ACM Opinion | May 19, 2014
The National Security Agency might be tracking your phone calls. But private industry is prying far more deeply into your life.Politico From ACM Opinion | May 16, 2014
In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...Technology Review From ACM News | May 16, 2014
Re "Reading, Writing, Arithmetic and Now Coding" (front page, May 11): Schools and parents are really off the mark in introducing coding (and technology in general)...The New York Times From ACM Opinion | May 16, 2014
In a ruling that could undermine press freedoms and free speech, the highest court of the European Union said on Tuesday that Google must comply with requests from...The New York Times From ACM Opinion | May 14, 2014
In June 2013, Edward Snowden was sitting in his room at the Mira hotel in Hong Kong, watching the world react to the first of his explosive leaks about the NSA's...Wired From ACM Opinion | May 13, 2014
Thanks to advances in technology, we may soon revisit a question raised four centuries ago: Are there things we should try not to know?The New York Times From ACM Opinion | May 12, 2014
In the scramble to gain market share in cyberspace, something is getting lost: the public interest.The New York Review of Books From ACM Opinion | May 12, 2014
When its handlers finally steer it into a collision course with Saturn in 2017, the spacecraft Cassini will have been in space for two decades, 13 of those years...BoingBoing From ACM Opinion | May 9, 2014