Technology companies will soon be able to disclose more details about the number of national security orders and requests they receive, according to a joint statement...The Washington Post From ACM Opinion | January 29, 2014
Ever since virtual worlds and online games emerged in the mainstream consciousness around 2005, the media has insisted on framing them as escapist fantasies.Slate From ACM Opinion | January 28, 2014
Privacy concerns have been ignited by "NameTag," a facial-recognition app designed to reveal personal information after analyzing photos taken on mobile devices...The Atlantic From ACM Opinion | January 27, 2014
Leading members of the U.S. cryptography and information-security research communities express their outrage over U.S. surveillance practices. .S. Cryptography and Information Security Researchers From ACM News | January 24, 2014
Assessing the benefits and challenges of knowledge spillovers.Marco Ceccagnoli, Chris Forman, Peng Huang, D. J. Wu From Communications of the ACM | February 1, 2014
Providing students, teachers, and parents with a better understanding of computer science and programming.Tim Bell From Communications of the ACM | February 1, 2014
Evaluating the trade-offs involved in cybersecurity professionalization.Diana L. Burley, Jon Eisenberg, Seymour E. Goodman From Communications of the ACM | February 1, 2014
The White House announced via blog post on Thursday that it's forming working group focused on understanding the promises and pitfalls of big data (with a heavy...GigaOm From ACM Opinion | January 24, 2014
In the movie Her, which was nominated for the Oscar for Best Picture this year, a middle-aged writer named Theodore Twombly installs and rapidly falls in love with...Technology Review From ACM Opinion | January 24, 2014
The world's most famous former intelligence contractor, Edward Snowden, is scheduled to answer questions posted on Twitter in an hour-long Webcast on Thursday.CNET From ACM Opinion | January 22, 2014
On a future road trip, your robot car decides to take a new route, driving you past a Krispy Kreme Doughnut shop.The Atlantic From ACM Opinion | January 22, 2014
A mysterious new technology emerges, seemingly out of nowhere, but actually the result of two decades of intense research and development by nearly anonymous researchers...The New York Times From ACM Opinion | January 22, 2014
Few critics of the NSA will find much satisfaction in President Obama's speech this morning or in the set of reforms that he announced.Slate From ACM Opinion | January 21, 2014
In 2013, bitcoin's valuation didn't just skyrocket, but its infrastructure, services, and adoption exploded as well, culminating in recent announcements that major...Fortune From ACM Opinion | January 21, 2014
The baffling Bitcoin boom is either an exercise in self-delusion—a high-tech Ponzi scheme that will come crashing down—or an imaginative new Internet technology...The Washington Post From ACM Opinion | January 21, 2014
Those of us who came of age in the Internet era may not know that they owe their ability to go online to a court decision 30 years ago today about a mechanically...Slate From ACM Opinion | January 17, 2014