A recent case challenges the long-standing view that application program interfaces are not protectable under copyright law.
Pamela Samuelson From Communications of the ACM | March 1, 2015
Good news! A major hack you don't have to worry about! Unless, that is, you happen to be an executive or security employee at one of the hundreds of banks targeted...Slate From ACM Opinion | February 19, 2015
Technology giants often meet their end not with a bang but a whimper, a slow, imperceptible descent into irrelevancy that may not immediately be reflected in the...The New York Times From ACM Opinion | February 13, 2015
For years, the federal government supported the principle of net neutrality: the idea that broadband providers should treat all Internet traffic the same.The New Yorker From ACM Opinion | February 9, 2015
The people clamoring for tough, new regulations for Internet service—everyone from net neutrality activists and a few blue-chip companies to President Obama and ...Bloomberg From ACM Opinion | February 5, 2015
After more than a decade of debate and a record-setting proceeding that attracted nearly 4 million public comments, the time to settle the Net Neutrality question...Wired From ACM Opinion | February 4, 2015
When Microsoft stock was at a record high in 1999, and its market capitalization was nearly $620 billion, the notion that Apple Computer would ever be bigger—let...The New York Times From ACM Opinion | January 30, 2015
On the opening night of this year's Sundance Film Festival, two films, as usual, had their premières, gaining maximum exposure to reporters and critics.The New Yorker From ACM Opinion | January 28, 2015
Soundy is the new sound.Benjamin Livshits, Manu Sridharan, Yannis Smaragdakis, Ondřej Lhoták, J. Nelson Amaral, Bor-Yuh Evan Chang, Samuel Z. Guyer, Uday P. Khedker, Anders Møller, Dimitrios Vardoulakis From Communications of the ACM | February 1, 2015
Comparing experiences publishing textbooks using traditional publishers and do-it-yourself methods.Armando Fox, David Patterson From Communications of the ACM | February 1, 2015
A proposal for a framework for code requirements addressing primary sources of vulnerabilities for building systems.Carl Landwehr From Communications of the ACM | February 1, 2015
Have you ever thought about why doorknobs are positioned at around two-fifths of the door's height, instead of right in the middle? Or why a washing machine is...Wired From ACM Opinion | January 22, 2015