In the build up to the 2016 U.S. election, both Democratic and Republican presidential hopefuls are talking about cybersecurity—and specifically state-sponsored...Wired From ACM Opinion | August 14, 2015
In June, a father of six was shot dead on a Monday afternoon in Evanston, Ill., a suburb 10 miles north of Chicago.The New York Times From ACM Opinion | August 12, 2015
Shortly after its founding, Google posted a document on its site called "Ten things we know to be true," an effort to distill its unusual corporate culture into...The New York Times From ACM Opinion | August 11, 2015
The fact that he couldn't feel the drill going into the back of his skull made the noise all the more terrifying.Wired From ACM Opinion | August 7, 2015
More than a year ago, in a decision that stunned many American Internet companies, Europe's highest court ruled that search engines were required to grant an unusual...The New York Times From ACM Opinion | August 6, 2015
Superintelligence: Paths, Dangers, Strategies is an astonishing book with an alarming thesis: Intelligent machines are "quite possibly the most important and most...Bulletin of the Atomic Scientists From ACM Opinion | August 3, 2015
In a landmark ruling in May 2014, the Court of Justice of the European Union (CJEU) established a "right to be forgotten", or more accurately, a "right to delist"...Google From ACM Opinion | July 30, 2015
Hundreds of game developers, publishers and analysts recently descended on Brighton for the annual Develop conference.The Guardian From ACM Opinion | July 30, 2015
Alan Turing made many predictions about artificial intelligence, but one of his lesser known may sound familiar to those who have heard Stephen Hawking or Elon...BBC News From ACM Opinion | July 27, 2015
When the history of the connected car is written, this week may go down as a pivotal moment for consumers worried about security.The New York Times From ACM Opinion | July 24, 2015
It's not a game or social media site, but OldNYC.org is as addictive as Angry Birds and as time consuming as Facebook.Wired From ACM Opinion | July 24, 2015
Improving learning and achievement in introductory computer science by incorporating creative thinking into the curriculum.Leen-Kiat Soh, Duane F. Shell, Elizabeth Ingraham, Stephen Ramsay, Brian Moore From Communications of the ACM | August 1, 2015
Two studies provide insights into how to increase the number of domestic doctoral students in U.S. computer science programs.
Susanne Hambrusch, Ran Libeskind-Hadas, Eric Aaron From Communications of the ACM | August 1, 2015
Seeking a better approach to pharmaceutical research and development.Henry Chesbrough, Marshall Van Alstyne From Communications of the ACM | August 1, 2015
Designers and developers of healthcare information technologies must address preexisting security vulnerabilities and undiagnosed future threats.David Kotz, Kevin Fu, Carl Gunter, Avi Rubin From Communications of the ACM | August 1, 2015
Think of Edward Snowden's vast leaks as a how-to guide for head-choppers looking to keep their own heads far from U.S. bombs.New York Daily News From ACM Opinion | July 22, 2015