From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
The scale and grandeur of the Winter Olympics in Sochi is estimated to have cost Russia an astronomical $46 billion.ArsTechnica From ACM Opinion | February 20, 2014
Google Glass shares much of its electronics and software with the smartphone, but it's a very different machine.Technology Review From ACM Opinion | February 19, 2014
One of the recommendations by the president's Review Group on Intelligence and Communications Technologies on reforming the National Security Agency—No. 5, if you're...Slate From ACM Opinion | February 18, 2014
Glenn Greenwald is back reporting about the NSA, now with Pierre Omidyar's news organization FirstLook and its introductory publication, The Intercept.The Atlantic From ACM News | February 12, 2014
Mike McConnell, former director of the National Security Agency and of National Intelligence, talks about the details of the NSA's surveillance program and tells...The Wall Street Journal From ACM Opinion | February 11, 2014
Twenty-five years on from the web's inception, its creator has urged the public to re-engage with its original design: a decentralised internet that at its very...Wired.co.uk From ACM Opinion | February 7, 2014
After an eight-year detour in which he served as governor of California, Arnold Schwarzenegger has returned to his true calling as a cyborg assassin.Bloomberg Businessweek From ACM Opinion | February 7, 2014
Whistleblower Edward Snowden's revelations have revealed that a huge capability resides within America's National Security Agency to collect and analyse communications...BBC News From ACM Opinion | February 6, 2014
Bitcoin has been called many things, from the future of money to a drug dealer's dream and everything else in between.New Scientist From ACM Opinion | February 6, 2014
Dropbox, the popular cloud storage system that lets people drag files to an icon that puts that data in the cloud and sync new versions across multiple devicesHiding...Technology Review From ACM Opinion | February 6, 2014
How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites?Wired From ACM Opinion | February 3, 2014
Many of us now expect our online activities to be recorded and analyzed, but we assume the physical spaces we inhabit are different.Scientific American From ACM Opinion | January 31, 2014
Technology companies will soon be able to disclose more details about the number of national security orders and requests they receive, according to a joint statement...The Washington Post From ACM Opinion | January 29, 2014