The Electronic Frontier Foundation urged the 9th U.S. Circuit Court of Appeals yesterday to preserve lawsuits challenging the government's illegal mass surveillance...The Electronic Frontier Foundation From ACM Opinion | September 1, 2011
The technology in question starts with "gigapixel" photography. Gigapixel photos are giant panoramas that themselves consist of hundreds of component mega-pixel...The Atlantic From ACM Opinion | August 31, 2011
How social media are expanding traditional research and development topics for computer and information scientists.Ben Shneiderman, Jennifer Preece, Peter Pirolli From Communications of the ACM | September 1, 2011
Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.Peter J. Denning, Ritu Raj From Communications of the ACM | September 1, 2011
How to improve IT outsourcing relationships while doing good for society.
Ron Babin, Steve Briggs, Brian Nicholson From Communications of the ACM | September 1, 2011
Sixty years ago, Maurice Wilkes, David Wheeler, and Stanley Gill produced the first textbook on programming: The Preparation of Programs for an Electronic Digital...Martin Campbell-Kelly From Communications of the ACM | September 1, 2011
Assessing the threat the anticircumvention provisions of the Digital Millennium Copyright Act pose for fair use.Rebecca Tushnet From Communications of the ACM | September 1, 2011
I've lost track of the number of people who've asked me to comment on David Cameron's insane plan to cripple Britain's Internet in times of civil unrest by blocking...The Guardian From ACM Opinion | August 17, 2011
Before we get to that, there's a clue in the spelling of the word: cyberwar instead of cyber war. The U.S. Defense Department has determined that cyber is a fifth...Slate From ACM Opinion | August 16, 2011
The Electronic Frontier Foundation, in collaboration with the Tor Project, has launched an official 1.0 version of HTTPS Everywhere, a tool for the Firefox Web...Electronic Frontier Foundation From ACM News | August 5, 2011
Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...China Daily From ACM News | August 5, 2011
Evgeny Kaspersky is one of Russia's top Internet virus hunters. In an interview, he discusses a raft of recent hacker attacks on multinationals, the "total professionals"...Spiegel Online From ACM Opinion | July 26, 2011
Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...The New York Times From ACM News | July 26, 2011
It's time to re-examine how we use, or overuse, the words "hack" and "hacker." They're relied on far too often to describe all kinds of activities that don't...Fast Company From ACM Opinion | July 25, 2011
Openness is the Internet's great strength—and weakness. With powerful forces carving it up, is its golden age coming to an end?New Scientist From ACM News | July 21, 2011
Leadership is a core competency of the officers, warrant officers, and non-commissioned officers across the military services. A principle tenant of leadership...Small Wars Journal From ACM Opinion | July 20, 2011
The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice...Joseph Y. Halpern, David C. Parkes From Communications of the ACM | August 1, 2011
An assessment of the U.S. government's EINSTEIN project.S. M. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford From Communications of the ACM | August 1, 2011