A proposal for a framework for code requirements addressing primary sources of vulnerabilities for building systems.Carl Landwehr From Communications of the ACM | February 1, 2015
Ross Ulbricht is finally getting his day in court, 15 months after plainclothes FBI agents grabbed him in the science fiction section of a San Francisco library...Wired From ACM Opinion | January 13, 2015
One of the best Twitter accounts inside the Beltway or out—belongs to former representativeJohn Dingell (D-Mich.), who announced his retirement with self-effacing...The Washington Post From ACM Opinion | January 12, 2015
Roughly a year and a half since the first Snowden disclosures, there's already been a judicial order to shut down the National Security Agency's bulk metadata collection...Ars Technica From ACM Opinion | January 5, 2015
As the clock strikes midnight on the new year, so begins the countdown to a new round of security threats and breaches that doubtless will unfold in 2015. But this...Wired From ACM Opinion | January 5, 2015
The Turing Award gives us a unique opportunity to become ambassadors of our wonderful field. It increases our outside visibility and enables us to build bridges...Silvio Micali From Communications of the ACM | January 1, 2015
Searching for an answer to the question of how much responsibility search engine operators should bear for privacy-related issues connected to search engine results...Lee A. Bygrave From Communications of the ACM | January 1, 2015
Considering the evolving relationship between established companies and their sharing-economy counterparts.Michael A. Cusumano From Communications of the ACM | January 1, 2015