As a boy growing up in Denmark, Eske Willerslev could not wait to leave Gentofte, his suburban hometown. As soon as he was old enough, he would strike out for the...The New York Times From ACM Opinion | May 19, 2016
Three researchers from the Kavli Institute for Particle Astrophysics and Cosmology, explain the circumstances of Hitomi's tragic accident and express their hopes...SLAC National Accelerator Laboratory From ACM Opinion | May 19, 2016
Chinese technology giant Huawei is preparing for a world where people live forever, dead relatives linger on in computers and robots try to kill humans.Bloomberg From ACM Opinion | May 13, 2016
For several decades now, Georgia Tech professor Tom Conte has been studying how to improve computers: "How do we make them faster and more efficient next time around...NPR From ACM Opinion | May 6, 2016
Intel was once known for its success in branding personal computers with microprocessors, a technology that fueled the digital revolution. But the Silicon Valley...NPR From ACM Opinion | May 3, 2016
The Edward Snowden leaks have accelerated the sophistication of encryption technologies by "about seven years," Director of National Intelligence James Clapper...The Christian Science Monitor From ACM Opinion | April 26, 2016
FBI Director James Comey gave a speech this week about encryption and privacy, repeating his argument that "absolute privacy" hampers law enforcement. But it was...NPR From ACM Opinion | April 11, 2016
In February, Microsoft Corp. Vice President Derrick Connell visited the Bing search team in Hyderabad, India, to oversee a Monday morning hackathon.Bloomberg From ACM Opinion | March 31, 2016
Linus Torvalds created the original core of the Linux operating system in 1991 as a computer science student at the University of Helsinki in Finland.IEEE Spectrum From ACM Opinion | March 30, 2016
The heated debate between the FBI and Apple over the encryption of the iPhone used by Syed Rizwan Farook, one of the two people who massacred 14 people in San Bernardino... From ACM Opinion | March 23, 2016
A hacking attack on a Las Vegas hotel company. A power grid blackout in the Ukraine. A series of industrial accidents at an Iranian nuclear enrichment lab.CNET From ACM Opinion | March 14, 2016
Shortly after Robert Hannigan took over the British signals-intelligence agency GCHQ in 2014, he implored technology companies to do more to facilitate investigations...Technology Review From ACM Opinion | March 14, 2016
Virtually everyone in technology knows about Kevin Mitnick, who in the 1970s, '80s and '90s was a notorious fugitive hacker on the run from the FBI.
Computerworld From ACM Opinion | March 9, 2016
The Apple-FBI standoff, where Apple is refusing to write special software that would help investigators crack into an iPhone of one of the San Bernardino shooters...NPR From ACM Opinion | March 8, 2016