Seeking solutions to concerns that go beyond the engineering of the smart grid.Timothy Kostyk, Joseph Herkert From Communications of the ACM | November 1, 2012
A multipronged approach to preparing computer science teachers is critical to success.Aman Yadav, John T. Korb From Communications of the ACM | November 1, 2012
Assessing the first phase of the trial based on claims that Google's Android platform infringes Oracle's Java-related copyrights and patents.
Pamela Samuelson From Communications of the ACM | November 1, 2012
Security research can be improved by more effectively sharing what is learned from attacks on information systems.David Basin, Srdjan Capkun From Communications of the ACM | November 1, 2012
Defense secretary Leon Panetta couldn't resist, could he? He couldn't fight the urge to dig deep into the information security cliché handbook and yank out that...Threatpost From ACM Opinion | October 22, 2012
More than a dozen science and engineering organizations worked with ScienceDebate.org to draft 14 top science questions to ask the two main presidential candidates...Scientific American From ACM Opinion | October 19, 2012
In general, we only become aware of a politician's position on scientific issues during the campaign season. And, with a few exceptions like energy and climate...ArsTechnica From ACM Opinion | October 18, 2012
There's much to like about "This Machine Kills Secrets," Andy Greenberg's well-reported history of WikiLeaks and the many projects it has inspired, but one unintentionally...The New York Times From ACM Opinion | October 18, 2012
Although academic fields will often enjoy more than Andy Warhol's famous 15 minutes of fame, they too are subject to today's ever-hungry machinery of hype. Like...Slate From ACM Opinion | October 17, 2012
In the age of freely available modeling software, laser cutters and 3D printers, shapes that must stay secret for security's sake don't stay secret for long. Especially...Forbes From ACM Opinion | October 15, 2012
The Mykonos Vase, discovered in 1961 in the Cyclades, is one of the earliest accounts of the Trojan Horse, used as a subterfuge by the Greeks to enter the city...The New York Times From ACM Opinion | October 11, 2012
In the wake of the 60-page report from Congress’s Select Committee On Intelligence recommending U.S. companies stop buying Chinese-made telecommunications gear...Forbes From ACM Opinion | October 10, 2012
You can tell a lot about a politician's priorities from who they deign to follow on Twitter. When David Cameron joined the service on Saturday, he started out following...The Guardian From ACM Opinion | October 9, 2012
When Apple co-founder Steve Jobs succumbed to cancer in his California home a year ago today, the world rushed to eulogize him in glowing terms: Genius. Visionary...CNN From ACM Opinion | October 5, 2012
After several months as the Internet's punching bag, Facebook finally has something to brag about: 1 billion active users.San Jose Mercury News From ACM Opinion | October 5, 2012
Americans should have no reasonable expectation of privacy over the location data stored by their mobile phone.Slate From ACM Opinion | October 3, 2012
To evaluate optimal patent protection for an invention, one has to consider both the cost of inventing and the cost of copying; the higher the ratio of the former...The Becker-Posner Blog From ACM Opinion | October 2, 2012
"IPhone5 Launch Causes Riots" You'd expect to see headlines like this when consumers beat down doors and trample each other, yet these riots were in China, among...Bloomberg Businessweek From ACM Opinion | September 27, 2012