All computer scientists know about the Universal Turing Machine, one of the foundation stones of theoretical computer science. Much less well known is the practical...Martin Campbell-Kelly From Communications of the ACM | July 1, 2012
Many proposed solutions to the species-threatening transformations born of human industrialization have an engineering orientation. Often the suggested remedies...R. T. Watson, J. Corbett, M. C. Boudreau, J. Webster From Communications of the ACM | July 1, 2012
Considering the legal responsibilities of Internet intermediaries in the aftermath of the Stop Online Privacy Act controversy.Pamela Samuelson From Communications of the ACM | July 1, 2012
June 23 marks the 100th birthday of Alan Turing. If I had to name five people whose personal efforts led to the defeat of Nazi Germany, the English mathematician...Arstechnica From ACM News | June 19, 2012
Here's a question: if you connect an unprotected Windows computer to the Internet, how long will it take before it is infected by malicious software?The Guardian From ACM Opinion | June 19, 2012
I've worked in computing, and more specifically computer networking, nearly all my life. It's an industry in a constant state of innovation, always pushing beyond...BBC News From ACM Opinion | June 18, 2012
When the news about the Flame malware first broke several weeks ago, people from all parts of the security community, political world and elsewhere quickly began...Threatpost From ACM Opinion | June 18, 2012
Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...Forbes From ACM Opinion | June 18, 2012
As cloud computing becomes increasingly common, serious operational "meltdowns" could take place as end users and vendors mix, match, and bundle services for various...IDG News Service From ACM TechNews | June 14, 2012
The U.S. Public Policy Council of the Association of Computing Machinery, representing ACM, came out against CISPA, the cybersecurity legislation recently passed...Electronic Frontier Foundation From ACM Opinion | June 13, 2012
That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.The New York Times From ACM News | June 12, 2012
Has the U.S. government been caught with its virtual hands in the world's cookie jar? And might it lose control of the Internet as a consequence?MSNBC From ACM Opinion | June 12, 2012
Two weeks ago, when we announced the discovery of the Flame malware we said that we saw no strong similarity between its code and programming style with that of ...Kaspersky Lab From ACM News | June 11, 2012
The United States has produced viable female presidential candidates, women athletes who command millions of dollars in endorsements, and the first female Nobel...Slate From ACM Opinion | June 11, 2012
Another day, another senior al-Qaeda leader killed by a drone strike. (I can't be the first to point out that being al-Qaeda's No. 2 is like being the drummer for...Time From ACM Opinion | June 9, 2012
In 1945, the United States organized a committee to investigate whether nuclear weapons should become a central military technology, or whether to abjure the weapons...Bulletin of the Atomic Scientists From ACM Opinion | June 8, 2012
The National Spelling Bee of 2023 started out like any other, but controversy enveloped the contest when Suzy Hamilton, an 8-year-old from Tulsa, emerged as the...The Wall Street Journal From ACM News | June 7, 2012
Science-fiction author Ray Bradbury, one of the world's leading writers of the genre for more than 60 years, died on Wednesday at the age of 91. Although he wrote...GigaOm From ACM Opinion | June 7, 2012