From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...Ari Schwartz From Communications of the ACM | June 1, 2011
Mapping the human genome showed how the Internet can play a vital part in collective scientific research. Now more scientists are collaborating—and inviting amateurs...The Observer From ACM Opinion | May 24, 2011
Without library privacy, individuals might not engage in free and open inquiry for fear that their interactions with the library will be used against them.Harvard Law School From ACM Opinion | May 20, 2011
It's hard to overestimate the importance of Ethernet to networking over the past 25 years. When Network World started, the technology had been around a while,...Network World From ACM Opinion | May 20, 2011
One of the joys of the last few years has been the flood of real-world data sets being released by all sorts of organizations. These usually involve some record...O'Reilly Radar From ACM News | May 18, 2011
Android is open-source software, but it doesn't come with much of an open-source community, and the Google leader of the project explained why.CNET From ACM News | May 17, 2011
Ted Hoff saved his own life, sort of. Deep inside this 73-year-old lies a microprocessor—a tiny computer that controls his pacemaker and, in turn, his heart.BBC News From ACM News | May 12, 2011
So Microsoft is buying Skype for $8.5 billion, its biggest deal ever. It’s too soon to make a pronouncement on whether the purchase is an idiot move, a brilliant...Wired From ACM Opinion | May 11, 2011
If there's one thing that's predictable in the technology world, it's that things change. Products that were commonplace 10 years ago (PDAs, CRT televisions,...MSNBC From ACM Opinion | May 10, 2011
As U.S. special forces assaulted Osama bin Laden's walled compound in Pakistan, a Twitter user was already recording a rough outline of the events to come. Sohaib...CNET From ACM Opinion | May 5, 2011
Microsoft researcher Gordon Bell, paperless for more than a decade, envisions data centers saturated with information and services readily available via the...Scientific American From ACM Opinion | May 4, 2011
WikiLeaks founder Julian Assange called Facebook "the most appalling spying machine ever invented" in an interview with Russia Today, pointing to the popular social...New York Daily News From ACM News | May 3, 2011
The decision to drop terror chieftain Osama bin Laden’s corpse into the Arabian Sea was the final meticulous step in a raid whose details were calculated to exert...Politico From ACM Opinion | May 2, 2011
No sooner had President Obama released his long-form birth certificate than Orly Taitz, the doyenne of the "birther" movement, found reason to doubt it.The New York Times From ACM Opinion | May 2, 2011
Sony's apparent difficulty in figuring out the extent of the damage from the recent intrusion into its PlayStation Network, while frustrating for those affected...Computerworld From ACM Opinion | April 28, 2011
Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...The New York Times From ACM Opinion | April 25, 2011
Steve Furber, designer of the seminal BBC Microcomputer System and the widely used ARM microprocessor, reflects on his career.Jason Fitzpatrick From Communications of the ACM | May 1, 2011
In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...Tim Wu From Communications of the ACM | May 1, 2011
Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.Brian Dorn From Communications of the ACM | May 1, 2011