From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
I spent several hours this past week watching video footage from hidden cameras that skimmer thieves placed at ATMs to surreptitiously record customers entering...Krebs on Security From ACM Opinion | September 5, 2012
It's officially the anniversary of the day Steve Jobs resigned as CEO of Apple and let Tim Cook take the reins.ArsTechnica From ACM Opinion | August 30, 2012
Hackers have found a flaw in Oracle's Java software that allows them to break into users' computers and install nasty malware, security experts report.Slate From ACM Opinion | August 29, 2012
If you ask an Internet ad guy to defend himself—to explain why you, dear Web surfer, should feel comfortable letting him serve you ads based on everything you do...Slate From ACM Opinion | August 24, 2012
In March 2002, John M. Poindexter, a former national security adviser to President Ronald Reagan, sat down with Gen. Michael V. Hayden, the director of the National...The New York Times From ACM Opinion | August 24, 2012
Christopher Soghoian sniffs out security holes and privacy shortcomings on the Web. Then he urges companies that are responsible—Google, AT&T, and Dropbox have...Technology Review From ACM Opinion | August 23, 2012
Denial of service attacks—flooding Web sites with traffic in order to make them unavailable to the public—have become an increasingly popular way to take down or...Electronic Frontier Foundation From ACM Opinion | August 23, 2012
Harvey Mudd College president Maria Klawe talks about increasing the number of women who study computer science.
Leah Hoffmann From Communications of the ACM | September 1, 2012
Wise experts and powerful machines are no match for chaotic events and human declarations. Beware of their predictions and be humble in your own.Peter J. Denning From Communications of the ACM | September 1, 2012
Seeking to improve the process for writing and reviewing proposals for new educational programs.Richard E. Ladner, Elizabeth Litzler From Communications of the ACM | September 1, 2012
Some thoughts about author order in research papers.Esperanza Marcos, Juan Manuel Vara, Valeria de Castro From Communications of the ACM | September 1, 2012
Two years ago, hackers gained access to an online voting system created by the District of Columbia and altered every ballot on behalf of their own preferred candidates...The Wall Street Journal From ACM Opinion | August 20, 2012
As Twitter and Facebook continue to fight a variety of skirmishes in the ongoing "platform wars," with both companies trying to control as much of their networks...GigaOm From ACM Opinion | August 14, 2012
Bruce Schneieer ordered a Coke, no ice, at the Rio casino on a Saturday afternoon. I ordered Diet Coke, also no ice, and handed the bartender an American Express...The New York Times From ACM Opinion | August 13, 2012
After being on the receiving end of a truly awful hacking attack, Wired writer Mat Honan explained how it happened in detail. And he was very clear about two of...GigaOm From ACM Opinion | August 9, 2012