The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...Ari Schwartz From Communications of the ACM | June 1, 2011
Mapping the human genome showed how the Internet can play a vital part in collective scientific research. Now more scientists are collaborating—and inviting amateurs...The Observer From ACM Opinion | May 24, 2011
So Microsoft is buying Skype for $8.5 billion, its biggest deal ever. It’s too soon to make a pronouncement on whether the purchase is an idiot move, a brilliant...Wired From ACM Opinion | May 11, 2011
A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...The New York Times From ACM Opinion | May 10, 2011
If there's one thing that's predictable in the technology world, it's that things change. Products that were commonplace 10 years ago (PDAs, CRT televisions,...MSNBC From ACM Opinion | May 10, 2011
In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services...San Jose Mercury news From ACM News | May 6, 2011
Some of the folks responsible for developing and promoting the technologies that have undermined the U.S. Postal Service are banding together in an attempt to save...The Washington Post From ACM Opinion | May 6, 2011
The decision to drop terror chieftain Osama bin Laden’s corpse into the Arabian Sea was the final meticulous step in a raid whose details were calculated to exert...Politico From ACM Opinion | May 2, 2011
Last Thursday morning around 5 a.m. eastern time, Amazon suffered a major data center outage. These sorts of outages happen now and then, but they seldom makewhy...Slate From ACM Opinion | April 27, 2011
Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...The New York Times From ACM Opinion | April 25, 2011
In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...Tim Wu From Communications of the ACM | May 1, 2011
Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.Brian Dorn From Communications of the ACM | May 1, 2011
Studying how privacy regulation might impact economic activity on the advertising-supported Internet.Avi Goldfarb, Catherine E. Tucker From Communications of the ACM | May 1, 2011
To compete with piracy, content providers need clear value propositions that don't conflict with the product.The Guardian From ACM Opinion | April 21, 2011