One difficulty of reporting on spy outfits like America's National Security Agency is the veil of secrecy they operate behind.The Economist From ACM Opinion | September 3, 2013
Last year, while cleaning out the basement of my childhood home, I discovered a plastic storage bin marked "Calcusoft." Inside were piles of notebooks filled with...The Atlantic From ACM Opinion | August 30, 2013
My annual report for the 2012-13 academic year stares at me from an undisturbed corner of my desk.The Chronicle of Higher Education From ACM Opinion | August 29, 2013
As he closed the door, leaving me alone at the controls of a 41,000-pound bulldozer with list price of nearly $432,000, a Komatsu Ltd. executive shouted, "No worries...The Wall Street Journal From ACM News | August 29, 2013
The year was 1988. George Michael's "Faith" was top of the pops. "Roseanne" was the number-one show on TV. Bruce Willis, starring in "Die Hard," still had hair.The Wall Street Journal From ACM Opinion | August 27, 2013
Last Sunday, David Miranda was detained while changing planes at London Heathrow Airport by British authorities for nine hours under a controversial British law—the...The Atlantic From ACM Opinion | August 26, 2013
A generation ago, when the stock market crashed on Oct. 19, 1987, the Nasdaq stock market appeared to have done much better than the New York Stock Exchange.The New York Times From ACM News | August 23, 2013
As an old reporter who has from time to time outed classified information, I have watched the cases of Bradley Manning and Edward Snowden with professional interest...The Atlantic From ACM Opinion | August 23, 2013
Whether it is acting as a conduit, an editor, or an advisor, the search engine should put user interests first.James Grimmelmann From Communications of the ACM | September 1, 2013
How can historians tell stories about software without focusing solely on the code itself?Thomas Haigh From Communications of the ACM | September 1, 2013
Seeking a more efficient combination of the best elements of the research and practice communities in small organizations.
Željko Obrenović From Communications of the ACM | September 1, 2013
The Code.org founder discusses his first program, inspirations, and "seizing the day."Lawrence Snyder From Communications of the ACM | September 1, 2013
Today's report in The Wall Street Journal reveals that the National Security Agency's spying tools extend deep into the domestic U.S. telecommunications infrastructure...The Wall Street Journal From ACM Opinion | August 21, 2013
Smartphone screens across the globe are embracing clean design in an effort to feature content on high-end pixel real estate.GigaOm From ACM Opinion | August 20, 2013
Seems like everything gets hacked these days. Baby monitors. White House employees' personal email. Toilets.The Atlantic From ACM News | August 19, 2013
Coming on the heels of our announcement that we had shut down our Silent Mail service, we received a comment about securing email communications.Silent Circle From ACM Opinion | August 19, 2013
This year the U.S. Congress is considering changes to the Computer Fraud and Abuse Act (CFAA), the primary law that governs cyber crime and fraud on the Internet...Scientific American From ACM Opinion | August 16, 2013