Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...François Lévêque From Communications of the ACM | June 1, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
Six years ago, we built Facebook around a few simple ideas. People want to share and stay connected with their friends and the people around them. If we give people...The Washington Post From ACM Opinion | May 26, 2010
The Web is a teeming commercial city. It's haphazardly planned. Its public spaces are mobbed, and signs of urban decay abound in broken links and abandoned projects...The New York Times From ACM Opinion | May 24, 2010
One of the great conundrums of war and technology is the odd fact that there is no such thing as a permanent first-mover advantage.Popular Mechanics From ACM Opinion | May 21, 2010
Telepathic helmets. Grid-computing swarms of cyborg insects, some for surveillance, some with lethal stingers. New cognitive-enhancement drugs. (What? AdderallProvigil...Slate From ACM Opinion | May 20, 2010
New research by the Electronic Frontier Foundation (EFF) has found that an overwhelming majority of web browsers have unique signatures--creating identifiable "fingerprints"...Electronic Frontier Foundation From ACM Opinion | May 19, 2010
In a brilliant column published 16 years ago, the Italian philosopher Umberto Eco explained the difference between Apple and Microsoft in terms of the divide between...Slate From ACM Opinion | May 17, 2010
All Americans--whether brown, white, or black--should be required to carry a passport showing they are red, white, and blue.Newsweek From ACM Opinion | May 14, 2010
Google's Android mobile operating system platform has outsold the iPhone in the first quarter of 2010 according to The NPD Group, a consumer market research and...eWeek From ACM Opinion | May 13, 2010
In their continued quest to plumb the mysterious depths of human interactions, some sociologists have stopped watching people—and started watching their avatars...Ars Technica From ACM Opinion | May 10, 2010
In 1998, a hacker told Congress that he could bring down the Internet in 30 minutes by exploiting a certain flaw that sometimes caused online outages. In 2003...The Associated Press From ACM Opinion | May 10, 2010
Bruno Bachimont, scientific advisor of the Department of Research and Innovation at France's Institut National de l'Audiovisuel, discusses the constructive mix...Integrated Science Education From ACM Opinion | May 6, 2010
"How can global warming be real when there’s so much snow?" Hearing that question—repeatedly—this past February drove Joseph Romm nuts. A massive snowstorm had...Wired From ACM Opinion | April 27, 2010
With a dizzying array of announcements this week, it seems almost inevitable that the web will become, at least for the near future, an extension of Facebook. Like...Wired From ACM Opinion | April 26, 2010
The story could have been programmed to draw media coverage, were it not for its implausibility: Apple (a reader magnet) banned a future Pulitzer Prize winner's...The Washington Post From ACM Opinion | April 23, 2010
Tracy Mitrano, Cornell University's director of IT Policy says the recent U.S. Federal Appeals Court decision in Comcast v. FCC and the FCC's efforts to enforce...Cornell niversity From ACM Opinion | April 23, 2010
The second of a two-part series highlighting several of the world's museums dedicated to preserving, exhibiting, and elucidating computing history.William Aspray From Communications of the ACM | May 1, 2010
Studying the prevalence of mobile email addiction and the associated possible implications for organizations.Ofir Turel, Alexander Serenko From Communications of the ACM | May 1, 2010