If Iran's post-election uprising last summer was the world's first "Twitter revolution," the massive Jan. 12 earthquake in Haiti was the first "Twitter disaster...Foreign Policy From ACM Opinion | February 10, 2010
I like to think of myself as the Dick Cheney of the Browser Wars—an unyielding proponent of greater and greater hostilities between the developers working on Chrome...Slate From ACM Opinion | February 8, 2010
The company once known for its "don't be evil" motto is now in bed with the spy agency known for the mass surveillance of American citizens.
The National Security...Wired From ACM Opinion | February 5, 2010
As they marvel at Apple’s new iPad tablet computer, the technorati seem to be focusing on where this leaves Amazon’s popular e-book business. But the much more...The New York Times From ACM Opinion | February 4, 2010
The more, the better. That’s the fashionable recipe for nurturing new ideas these days. It emphasizes a kind of Internet-era egalitarianism that celebrates the...The New York Times From ACM Opinion | February 1, 2010
President of People's Daily Online He Jiazheng speaks on Internet freedom:
The Google-China dispute shows a strategic position change of the United States. In...People's Daily Online From ACM Opinion | January 27, 2010
Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such as Gmail, in a politically motivated attempt...CNN From ACM Opinion | January 26, 2010
Over the past 40 years, the US has been dominating the world Internet as the core technique holder with an inherent advantage of being the cradle of the Internet...China Daily From ACM Opinion | January 26, 2010
In his July 2009 Communications editor's letter "Open, Closed, or Clopen Access?", editor-in-chief Moshe Vardi addressed...Michel Beaudouin-Lafon From Communications of the ACM | February 1, 2010
Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.
Douglas Maughan From Communications of the ACM | February 1, 2010
Why it is difficult — but essential — to monitor the effectiveness of security technologies.M. Angela Sasse From Communications of the ACM | February 1, 2010
Everybody's talking about the new tablet computer Apple is expected to unveil this month. Some say it will save newspapers by giving them a new platform where they...Newsweek From ACM Opinion | January 13, 2010
Do you remember where you were the day they unveiled Facebook? No? How about Twitter? Amazon.com? Google Search?
Massive, culture-shifting technologies are almost...Computerworld From ACM Opinion | January 12, 2010
The knives came out in full view between Apple and Google earlier this week. On the same day that Google launched its latest Nexus One Android phone, Apple announced...TechCrunch From ACM Opinion | January 8, 2010
A recent Wall Street Journal article, which provided confirmation of an Apple tablet device, had all the earmarks of a controlled leak. Here's how Apple does it...The Mac Observer From ACM Opinion | January 7, 2010
If there were a jack of all trades at Microsoft, Technical Fellow Butler Lampson, who is also an ACM Fellow and a former ACM A.M. Turing Award recipient, would...ZDNet From ACM Opinion | January 5, 2010
How platform adoption can be an important determinant of product and technological success.Michael Cusumano From Communications of the ACM | January 1, 2010
Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...Scientific American From ACM Opinion | December 8, 2009