I was recently asked to talk about the idea of "open," and I realized the term is used in at least eight different ways.Telefonica Digital Hub From ACM Opinion | October 9, 2013
Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA.Wired From ACM Opinion | October 9, 2013
On the day after Aaron Swartz's death in January, President Reif and I spoke about how MIT might respond to the breaking news of his suicide.Technology Review From ACM Opinion | October 4, 2013
The recent revelation that the National Security Agency collects the personal data of United States citizens, allies and enemies alike has broken the traditional...Politico From ACM Opinion | October 1, 2013
While the collection of private information by the National Security Agency is under scrutiny worldwide, a remarkable amount of your digital trail is also available...NPR From ACM News | October 1, 2013
It is now 30 years since I launched the campaign for freedom in computing, that is, for software to be free or "libre" (we use that word to emphasize that we're...Wired From ACM Opinion | October 1, 2013
Beleaguered gadgetmaker BlackBerry said on Monday that it's signed a tentative agreement to be purchased by a group led by Canadian holding company Fairfax Financial...Time From ACM Opinion | September 25, 2013
Over half of the world’s population lives in urban environments, and that number is rapidly growing according to the World Health Organization.The Atlantic From ACM Opinion | September 20, 2013
Apple is today releasing the much-anticipated iOS 7, and with it, the biggest overhaul of its mobile operating system since it debuted in 2007 with the original...CNET From ACM Opinion | September 18, 2013
Internet usage—especially microblogging on Sina Weibo, China’s largest Twitter-like social media site—is presenting new challenges and new attempts to meet them...The Wall Street Journal From ACM Opinion | September 18, 2013
Last week, I visited the MIT computer science department looking for a very famous cryptographer.Technology Review From ACM Opinion | September 17, 2013
There's a widely shared image on the Internet of a teacher's note that says: "Dear students, I know when you're texting in class. Seriously, no one just looks down...The Wall Street Journal From ACM Opinion | September 10, 2013
Exactly two decades ago, the RAND Corporation, an influential think tank, proclaimed that "cyberwar is coming!"New Scientist From ACM Opinion | September 10, 2013
The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...Bloomberg Businessweek From ACM Opinion | September 9, 2013
When Apple bought AuthenTec for its biometrics technology—reported as one of its most expensive purchases—there was a lot of speculation about how the company would...Wired From ACM Opinion | September 9, 2013
National Security Agency efforts to overcome encryption of online data weaken American security and undermine the government's duty to protect its own cyberinfrastructure...Indiana niversity From ACM Opinion | September 9, 2013