What happens when you click on a Weblink? Here's one answer: A request goes from your computer to a server identified by the URL of the desired link. The server...The Guardian From ACM Opinion | February 21, 2012
Four months after I walked into a lab at Harvard University and gave a vial of blood to have my genome sequenced, my search to understand my DNA led me to Mark...Bloomberg Businessweek From ACM Opinion | February 21, 2012
Last year, the level and ferocity of cyberattacks on the Internet reached such a horrendous level that some are now thinking the unthinkable: let the Internet wither...BBC News From ACM Opinion | February 20, 2012
Apple's iPhones and iPads get most of the attention, but Apple is now directing the spotlight on the Mac.The New York Times From ACM Opinion | February 17, 2012
LightSquared may have had a great case for building its wireless network, but the fledgling company lacked the political tact to see it through.CNET From ACM Opinion | February 17, 2012
First, the bad news: A small number of active RSA public encryption keys, a popular type of encryption protocol that secures billions of online transactions, offer...Bloomberg Businessweek From ACM Opinion | February 16, 2012
It was the holy grail of investors. The Black-Scholes equation, brainchild of economists Fischer Black and Myron Scholes, provided a rational way to price a financial...The Guardian From ACM Opinion | February 14, 2012
In a recent briefing to Congress about worldwide threats, FBI Director Robert S. Mueller III said that the danger of cyberattacks will equal or surpass the danger...The Washington Post From ACM Opinion | February 13, 2012
All indicators suggest Apple will unveil the iPad 3 during the first week of March. That’s less than a month away, and sources at The Next Web say Apple is in "crunch...Wired From ACM Opinion | February 13, 2012
Some forms of biotechnology have become notoriously controversial. Genetic modification of crops, for example, altered the food supply in ways some consumers...The Scientist From ACM Opinion | February 7, 2012
Thirty-seven million iPhones. Fifteen million iPads. Fifteen million iPods. Five million Macs. A million Apple TVs. No matter how you do the math, that's a boatload...Time From ACM Opinion | January 26, 2012
Locked in our federal vaults is a tremendous storehouse of information that if digitized would form a core for our digital public libraries in America with huge...Center for American Progress From ACM Opinion | January 26, 2012
Upon closer examination, everything old appears to be new again in the realm of software engineering.Marvin V. Zelkowitz From Communications of the ACM | February 1, 2012
Examining the role of human emotional response in making complex security-related decisions.Rose McDermott From Communications of the ACM | February 1, 2012