From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
The western media sought to play down Iran's cyber and computer software capability by releasing hundreds of reports on the discovery of a new computer virus and...Fars News Agency From ACM Opinion | July 18, 2012
Cellphones, email, and online social networking have come to rule daily life, but Congress has done nothing to update federal privacy laws to better protect digital...The New York Times From ACM Opinion | July 16, 2012
The Internet of things is supposed to connect every aspect of our lives from our homes and cars to the objects we wear and the goods we consume. It's even connecting...GigaOm From ACM Opinion | July 16, 2012
What's the real lesson to be learned from Amazon's cloud computing failure two weeks ago, the one that knocked Netflix and other Websites offline?The Wall Street Journal From ACM Opinion | July 13, 2012
Google started work on the Google Compute Engine over a year and a half ago, and it was all Peter Magnusson could do to keep his mouth shut.Wired From ACM News | July 6, 2012
Does the U.S. government read your email? It's a simple question, but apparently there's no simple answer. And the Justice Department and the Internal Revenue Service...MSNBC From ACM News | July 6, 2012
The growing use of drones in the United States is facing firm opposition from civil liberties groups and some legislators, like Sen. Rand Paul, R-Ky., and Rep. ...Slate From ACM Opinion | July 3, 2012
I asked noted cryptographer, author and security rock star Bruce Schneier for his thoughts. Schneier: I regularly receive email from people who want advice on how...Krebs on Security From ACM Careers | July 2, 2012
The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush's presidency...The New York Times From ACM Opinion | June 26, 2012
Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense challenges, including management...Sarah Spiekermann From Communications of the ACM | July 1, 2012
By closely connecting research and development Google is able to conduct experiments on an unprecedented scale, often resulting in new capabilities for the company...Alfred Spector, Peter Norvig, Slav Petrov From Communications of the ACM | July 1, 2012
All computer scientists know about the Universal Turing Machine, one of the foundation stones of theoretical computer science. Much less well known is the practical...Martin Campbell-Kelly From Communications of the ACM | July 1, 2012
Many proposed solutions to the species-threatening transformations born of human industrialization have an engineering orientation. Often the suggested remedies...R. T. Watson, J. Corbett, M. C. Boudreau, J. Webster From Communications of the ACM | July 1, 2012
Considering the legal responsibilities of Internet intermediaries in the aftermath of the Stop Online Privacy Act controversy.Pamela Samuelson From Communications of the ACM | July 1, 2012
Here's a question: if you connect an unprotected Windows computer to the Internet, how long will it take before it is infected by malicious software?The Guardian From ACM Opinion | June 19, 2012