Considering the many different paths and unprecedented opportunities for companies exploring emerging markets.Mari Sako From Communications of the ACM | April 1, 2015
Two proposals intended to reduce flaws in software use two very different approaches for software security.Dorothy E. Denning From Communications of the ACM | April 1, 2015
The N.C.A.A. men's basketball tournament started Thursday, but for most Americans the real action began days before, as they pored over brackets, competing to make...The New York Times From ACM Opinion | March 23, 2015
Social networks offer an incredible tool for tapping into the collective unconscious, a virtual Jungian arena in which competition might be expected to amplify...The Atlantic From ACM Opinion | March 17, 2015
More than half of Americans are worried about the U.S. government's digital spies prying into their emails, texts, search requests and other online information,...The Associated Press From ACM Opinion | March 16, 2015
Search for "vaccines." At least within our filter bubble, the top item in Google's "In the news" section earlier this week was an anti-vax column about the "feds'...Slate From ACM Opinion | March 16, 2015
Possibly not everyone knows that March 14th is Pi Day, in honor of the symbol used to denote the ratio of the circumference of a circle to its diameter.The New Yorker From ACM Opinion | March 16, 2015
"Chappie," the highest-grossing movie in America last weekend, is, to put it mildly, not a great film; the critics have given it a twenty-nine on Rotten Tomatoes...The New Yorker From ACM Opinion | March 13, 2015
It is thought that studies involving the use of genome-editing tools to modify the DNA of human embryos will be published shortly.Nature From ACM Opinion | March 13, 2015
Let me hazard a guess that you think a real person has written what you're reading. Maybe you're right. Maybe not.The New York Times From ACM Opinion | March 10, 2015
Last November in the town of Wuzhen, China hosted its first large international summit on Internet governance and cybersecurity.Scientific American From ACM Opinion | March 5, 2015
Thursday, during a rancorous meeting of the Federal Communications Commission, the agencyvoted 3-2 to impose public utility regulations on Internet access providers...The Washington Post From ACM Opinion | March 2, 2015
My coffee maker is texting me again. It's scheduled to make coffee tomorrow, the message says, but I need to refill its water tank.NPR From ACM Opinion | February 27, 2015