From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
The antitrust case against Google filed by European Union regulators on Wednesday will inevitably draw comparisons to the long-running prosecution of Microsoft,...The New York Times From ACM Opinion | April 15, 2015
Edward Snowden appears to have a thing for the late British conservative prime minister Margaret Thatcher. And his obsession may even be clouding his famously paranoid...Wired From ACM Opinion | April 14, 2015
Moore's Law, which states that the number of transistors per integrated circuit will double approximately every 18–24 months, has become the defining metaphor of...The Washington Post From ACM Opinion | April 14, 2015
Edward Snowden and an unlikely interviewer squared-off on HBO over the leaks that exposed the National Security Agency's extensive surveillance programs.CNET From ACM Opinion | April 6, 2015
When the Japanese computer scientist Yukihiro Matsumoto decided to create Ruby, a programming language that has helped build Twitter, Hulu, and much of the modern...Technology Review From ACM Opinion | April 2, 2015
Shortly before the dreadful crash of Germanwings Flight 9525, I happened to be reading part of "The Second Machine Age," a book by two academics at M.I.T., Erik...The New Yorker From ACM Opinion | March 30, 2015
Data science is not entirely new to Washington, D.C.—nor is DJ Patil, who was recently named as the U.S.'s first chief data scientist.Scientific American From ACM Opinion | March 30, 2015
Facebook chief technology officer Mike Schroepfer turned 40 last month. He (just barely) blew out a row of 40 candles during a mini-celebration at company headquarters... From ACM Opinion | March 27, 2015
Governments and corporations gather, store, and analyze the tremendous amount of data we chuff out as we move through our digitized lives.Wired From ACM Opinion | March 26, 2015
Two proposals intended to reduce flaws in software use two very different approaches for software security.Dorothy E. Denning From Communications of the ACM | April 1, 2015
The N.C.A.A. men's basketball tournament started Thursday, but for most Americans the real action began days before, as they pored over brackets, competing to make...The New York Times From ACM Opinion | March 23, 2015
I've seen two competing visions for a future in which virtual objects are merged seamlessly with the real world.Technology Review From ACM Opinion | March 20, 2015
DJ Patil was recently named the White House's deputy chief technology officer for data policy and chief data scientist, making him the first-ever national datacoined...Fivethirtyeight From ACM Opinion | March 20, 2015