From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...Ari Schwartz From Communications of the ACM | June 1, 2011
Without library privacy, individuals might not engage in free and open inquiry for fear that their interactions with the library will be used against them.Harvard Law School From ACM Opinion | May 20, 2011
One of the joys of the last few years has been the flood of real-world data sets being released by all sorts of organizations. These usually involve some record...O'Reilly Radar From ACM News | May 18, 2011
Android is open-source software, but it doesn't come with much of an open-source community, and the Google leader of the project explained why.CNET From ACM News | May 17, 2011
A year ago, Ralph Langner was plugging away in relative obscurity, doing security consulting work for the industrial control system industry in his Hamburg headquarters...CNET From ACM News | May 13, 2011
It's been about two months since Hewlett-Packard’s new CEO Léo Apotheker put the company on a new cloud-centric path as part of a big speech laying out a new strategy...AllThingsD From ACM News | May 11, 2011
A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...The New York Times From ACM Opinion | May 10, 2011
In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services...San Jose Mercury news From ACM News | May 6, 2011
It's time for a major change in the way our personal, private data is handled. We need to take back our data from companies that are unwilling and unable to protect...ZDNet From ACM Opinion | May 5, 2011
As U.S. special forces assaulted Osama bin Laden's walled compound in Pakistan, a Twitter user was already recording a rough outline of the events to come. Sohaib...CNET From ACM Opinion | May 5, 2011
WikiLeaks founder Julian Assange called Facebook "the most appalling spying machine ever invented" in an interview with Russia Today, pointing to the popular social...New York Daily News From ACM News | May 3, 2011
Sony's apparent difficulty in figuring out the extent of the damage from the recent intrusion into its PlayStation Network, while frustrating for those affected...Computerworld From ACM Opinion | April 28, 2011
Although Apple was silent for several days after researchers raised issues about location information being stored on the iPhone, that wasn’t because it was ignoring...AllThingsD From ACM Opinion | April 28, 2011
Last Thursday morning around 5 a.m. eastern time, Amazon suffered a major data center outage. These sorts of outages happen now and then, but they seldom makewhy...Slate From ACM Opinion | April 27, 2011
Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...The New York Times From ACM Opinion | April 25, 2011
Highlighting the significance of the often overlooked underlying software used to produce research results.Juan A. Añel From Communications of the ACM | May 1, 2011
Steve Furber, designer of the seminal BBC Microcomputer System and the widely used ARM microprocessor, reflects on his career.Jason Fitzpatrick From Communications of the ACM | May 1, 2011
In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...Tim Wu From Communications of the ACM | May 1, 2011