From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
As Twitter and Facebook continue to fight a variety of skirmishes in the ongoing "platform wars," with both companies trying to control as much of their networks...GigaOm From ACM Opinion | August 14, 2012
Bruce Schneieer ordered a Coke, no ice, at the Rio casino on a Saturday afternoon. I ordered Diet Coke, also no ice, and handed the bartender an American Express...The New York Times From ACM Opinion | August 13, 2012
To the steadily growing list of digital weapons that appear to have been jointly created by the combined resources of the U.S. and Israel, we can now add another...AllThingsD From ACM Opinion | August 10, 2012
After being on the receiving end of a truly awful hacking attack, Wired writer Mat Honan explained how it happened in detail. And he was very clear about two of...GigaOm From ACM Opinion | August 9, 2012
Mat Honan, the technology reporter who was digitally disemboweled this past weekend, has revealed exactly how he was so spectacularly owned. His case, a cascade...Scientific American From ACM Opinion | August 8, 2012
A blackout in Manhattan. A major dam failure. Mayhem at a chemical plant. Those are all potential, and entirely plausible, consequences of a cyber attack, according...Time From ACM Opinion | August 7, 2012
The escalating dependence on drone pilots, as Maj. Dave Blair agonized in the May-June issue ofAir & Space Power Journal, is undercutting the ability to award combat...Slate From ACM Opinion | August 7, 2012
On November 5, 2009, an Army psychiatrist stationed at Fort Hood, Texas shot and killed 12 fellow soldiers and a civilian Defense Department employee while wounding...ArsTechnica From ACM News | August 3, 2012
Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.The New York Times From ACM Opinion | July 30, 2012
A security researcher who's spent 18 months cataloging and tracking malicious software that was developed and deployed specifically for spying on governments, activists...Krebs on Security From ACM Opinion | July 30, 2012
A big part of Magistrate Judge Stephen W. Smith's job in Federal District Court in Houston is to consider law enforcement requests for cellphone and email records...The New York Times From ACM Opinion | July 26, 2012
Viewing software engineering as a communicative art in which client engagement is essential.Neil McBride From Communications of the ACM | August 1, 2012
Experiences with electronic voting suggest elections should not be conducted via the Internet.Kai A. Olsen, Hans Fredrik Nordhaug From Communications of the ACM | August 1, 2012
Sharing recent experiences with the massive open artificial intelligence course developed and conducted by Stanford faculty Sebastian Thrun and Peter Norvig.
Fred G. Martin From Communications of the ACM | August 1, 2012
North Korea has a sizeable IT sector. Some 10,000 professionals work in the field, and many more have IT degrees. They are already engaged in outsourcing contracts...Paul Tjia From Communications of the ACM | August 1, 2012
It's early February in Cancun, Mexico. A group of 60 or so financial analysts, reporters, diplomats, and cybersecurity specialists shake off the previous night's...Wired From ACM Opinion | July 25, 2012