From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
How will police use a gun that immobilizes its target but does not kill? What would people do with a device that could provide them with any mood they desire? What...The Atlantic From ACM Opinion | September 20, 2013
Over half of the world’s population lives in urban environments, and that number is rapidly growing according to the World Health Organization.The Atlantic From ACM Opinion | September 20, 2013
Apple is today releasing the much-anticipated iOS 7, and with it, the biggest overhaul of its mobile operating system since it debuted in 2007 with the original...CNET From ACM Opinion | September 18, 2013
Internet usage—especially microblogging on Sina Weibo, China’s largest Twitter-like social media site—is presenting new challenges and new attempts to meet them...The Wall Street Journal From ACM Opinion | September 18, 2013
Last week, I visited the MIT computer science department looking for a very famous cryptographer.Technology Review From ACM Opinion | September 17, 2013
Two of the most influential venture capitalists in Silicon Valley, John Doerr and Vinod Khosla, weighed in on the current controversy government surveillance, contending...CNET From ACM Opinion | September 12, 2013
New startups looking for ways to keep their users secure should know one thing, a top Google security executive said Tuesday: "Passwords are dead."CNET From ACM Opinion | September 11, 2013
There's a widely shared image on the Internet of a teacher's note that says: "Dear students, I know when you're texting in class. Seriously, no one just looks down...The Wall Street Journal From ACM Opinion | September 10, 2013
Exactly two decades ago, the RAND Corporation, an influential think tank, proclaimed that "cyberwar is coming!"New Scientist From ACM Opinion | September 10, 2013
The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...Bloomberg Businessweek From ACM Opinion | September 9, 2013
When Apple bought AuthenTec for its biometrics technology—reported as one of its most expensive purchases—there was a lot of speculation about how the company would...Wired From ACM Opinion | September 9, 2013
National Security Agency efforts to overcome encryption of online data weaken American security and undermine the government's duty to protect its own cyberinfrastructure...Indiana niversity From ACM Opinion | September 9, 2013
Now that we have enough details about how the NSA eavesdrops on the Internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems...The Guardian From ACM Opinion | September 6, 2013
If the Obama administration does conduct military strikes against Syria, as seems likely, it should use military cyber weapons at the earliest possible moment to...Defense One From ACM Opinion | September 6, 2013