From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
To avoid surveillance, the first four Americans to visit Edward Snowden in Moscow carried no cell phones or laptops.Time From ACM Opinion | December 12, 2013
At the stroke of midnight on December 10, 1993, an executive at id Software uploaded a file to an FTP site on the University of Washington's network.Wired From ACM Opinion | December 11, 2013
Google is predicting a generation of screenless computing devices that rely on voice recognition, a senior engineer has said, emphasising that the company encrypts...The Guardian From ACM Opinion | December 10, 2013
Investigators are still studying what caused the derailment of a Metro-North commuter train on its way to Grand Central Terminal just over a week ago, killing four...The Atlantic From ACM Opinion | December 10, 2013
In 1984, Mike Lazaridis, an engineering student at the University of Waterloo, and Douglas Fregin, an engineering student at the University of Windsor, founded...Bloomberg Businessweek From ACM Opinion | December 10, 2013
At a wine bar in San Francisco on Wednesday, Broadcom Chairman and CTO Henry Samueli delivered some sobering news: Moore's Law isn't making chips cheaper anymore...Computerworld From ACM Opinion | December 6, 2013
When you clicked on the link to read this article, your computer, tablet or phone sent a request that traveled hundreds or perhaps thousands of miles at the speed...Smithsonian magazine From ACM Opinion | December 3, 2013
Maybe it's your mom and/or dad. Maybe it's a sibling or a grandparent. Or maybe it's just that one friend who still uses a Motorola Razr from the early 2000s.Wired From ACM Opinion | November 27, 2013
University of Illinois at Urbana-Champaign National Center for Supercomputing Application director Thom Dunning discusses the potential for using computational...HPC Wire From ACM TechNews | November 25, 2013
Internet security relies on the fact that our computers can't break its cryptosystems. But the quantum algorithm you devised has the potential to do just that.New Scientist From ACM Opinion | November 26, 2013