Quantum-computer whiz riffs on simulated universes, the Singularity, unified theories, P/NP, the mind-body problem, free will, why there's something rather than...Scientific American From ACM Opinion | April 27, 2016
The Edward Snowden leaks have accelerated the sophistication of encryption technologies by "about seven years," Director of National Intelligence James Clapper...The Christian Science Monitor From ACM Opinion | April 26, 2016
Guido van Rossum, the creator of Python, tells of growing up, discovering computers in the Netherlands, creating one of the world's most popular programming languages...TechRocket From ACM Opinion | April 25, 2016
Many think author, inventor and data scientist Ray Kurzweil is a prophet for our digital age. A few say he's completely nuts.
Playboy From ACM Opinion | April 22, 2016
FBI Director James Comey gave a speech this week about encryption and privacy, repeating his argument that "absolute privacy" hampers law enforcement. But it was...NPR From ACM Opinion | April 11, 2016
In February, Microsoft Corp. Vice President Derrick Connell visited the Bing search team in Hyderabad, India, to oversee a Monday morning hackathon.Bloomberg From ACM Opinion | March 31, 2016
Linus Torvalds created the original core of the Linux operating system in 1991 as a computer science student at the University of Helsinki in Finland.IEEE Spectrum From ACM Opinion | March 30, 2016
Supratik Guha, director for Argonne National Laboratory's Center for Nanoscale Materials and its Nanoscience & Technology Division, gives his perspective on where...Argonne National Laboratory From ACM Opinion | March 30, 2016
The heated debate between the FBI and Apple over the encryption of the iPhone used by Syed Rizwan Farook, one of the two people who massacred 14 people in San Bernardino... From ACM Opinion | March 23, 2016
In an interview, former Stanford University Graduate School of Business doctoral students Julie Oberweis and Monica Leas discuss the genesis of a survey detailing...Insights From ACM TechNews | March 18, 2016
A hacking attack on a Las Vegas hotel company. A power grid blackout in the Ukraine. A series of industrial accidents at an Iranian nuclear enrichment lab.CNET From ACM Opinion | March 14, 2016
Shortly after Robert Hannigan took over the British signals-intelligence agency GCHQ in 2014, he implored technology companies to do more to facilitate investigations...Technology Review From ACM Opinion | March 14, 2016
Virtually everyone in technology knows about Kevin Mitnick, who in the 1970s, '80s and '90s was a notorious fugitive hacker on the run from the FBI.
Computerworld From ACM Opinion | March 9, 2016
The Apple-FBI standoff, where Apple is refusing to write special software that would help investigators crack into an iPhone of one of the San Bernardino shooters...NPR From ACM Opinion | March 8, 2016