I've been thinking about the combination of artificial intelligence and intelligence amplification and specifically the symbiosis of these two things. And the...Acceler8or From ACM Opinion | August 1, 2011
The Museum of Modern Art’s "Talk to Me: Design and the Communication Between People and Objects" is one of the smartest design shows in years—by which I mean...The New York Times From ACM Opinion | July 29, 2011
The marked increase in the use of the Internet for accessing computing resources will necessitate an evolution in the cloud computing network. MarketWatch From ACM Opinion | July 28, 2011
Bob Young knows about open source and innovation. He's co-founder and former CEO of Red Hat. Founder and CEO of Lulu. Here are the lessons he's learned from open...opensource.com From ACM Opinion | July 28, 2011
The Norway killer allegedly spent 200 hours searching the Internet for 'how to make a bomb.' Could Google have traced him?Special Broadcasting Service From ACM Opinion | July 28, 2011
Take a look around you. The walls, the chair you're sitting in, your own body—they all seem real and solid. Yet there is a possibility that everything we see...New Scientist From ACM Opinion | July 28, 2011
Twitter users have a way of self-identifying gratuitous complaints they make. They use the hashtag first-world problems. As in, "I can't believe Netflix is doubling...DesMoinesRegister.com From ACM Opinion | July 27, 2011
University of Alabama at Birmingham social psychologist Rex A. Wright explains why some people do not view phone hacking as unethical and why those that see it...niversity of Alabama at Birmingham From ACM Opinion | July 27, 2011
Ever since humans evolved on this planet we have been trying to make sense of the world around us. We have attempted to explain why the world looks and behaves...BBC News From ACM Opinion | July 27, 2011
You probably use voice recognition technology already, if in a limited capacity. Maybe you use Google's voice-activated search, or take advantage of its (somewhat...Technology Review From ACM News | July 27, 2011
Evgeny Kaspersky is one of Russia's top Internet virus hunters. In an interview, he discusses a raft of recent hacker attacks on multinationals, the "total professionals"...Spiegel Online From ACM Opinion | July 26, 2011
Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...The New York Times From ACM News | July 26, 2011
It's time to re-examine how we use, or overuse, the words "hack" and "hacker." They're relied on far too often to describe all kinds of activities that don't...Fast Company From ACM Opinion | July 25, 2011
Five years ago this month, Twitter opened itself up to the public. The new service, initially called Twttr, was born out of software engineer Jack Dorsey's fascination...Slate From ACM Opinion | July 22, 2011
Openness is the Internet's great strength—and weakness. With powerful forces carving it up, is its golden age coming to an end?New Scientist From ACM News | July 21, 2011
When we think of being connected to the Internet, our minds immediately shift to our computers, phones, and most recently tablets. This week at Cisco live, I...Cisco Systems From ACM Opinion | July 20, 2011
Leadership is a core competency of the officers, warrant officers, and non-commissioned officers across the military services. A principle tenant of leadership...Small Wars Journal From ACM Opinion | July 20, 2011
The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice...Joseph Y. Halpern, David C. Parkes From Communications of the ACM | August 1, 2011