From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such as Gmail, in a politically motivated attempt...CNN From ACM Opinion | January 26, 2010
Over the past 40 years, the US has been dominating the world Internet as the core technique holder with an inherent advantage of being the cradle of the Internet...China Daily From ACM Opinion | January 26, 2010
In his July 2009 Communications editor's letter "Open, Closed, or Clopen Access?", editor-in-chief Moshe Vardi addressed...Michel Beaudouin-Lafon From Communications of the ACM | February 1, 2010
Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.
Douglas Maughan From Communications of the ACM | February 1, 2010
Why it is difficult — but essential — to monitor the effectiveness of security technologies.M. Angela Sasse From Communications of the ACM | February 1, 2010
Google CEO Eric Schmidt has long defended his company's decision to do business in China despite the restrictions that Beijing imposes on Internet freedom. Nevertheless...Newsweek From ACM Opinion | January 21, 2010
Dickie George, the technical director of the U.S. National Security Agency's (NSA's) Information Assurance Directorate, says the shortage of cybersecurity professionals...GovInfoSecurity.com From ACM TechNews | January 14, 2010
Last week brought some bad news for mobile phone users. German security expert Karsten Nohl demonstrated how easy it is to eavesdrop on GSM-based (Global System...CNET From ACM Opinion | January 4, 2010
Last week brought some bad news for mobile phone users. German security expert Karsten Nohl demonstrated how easy it is to eavesdrop on GSM-based (Global System...CNET From ACM Opinion | January 4, 2010
Last week's attempted terror attack on an airplane heading from Amsterdam to Detroit has given rise to a bunch of familiar questions.
How did the explosives get...CNN From ACM Opinion | December 30, 2009
With the caveat that the U.S. Transportation Security Administration has yet to confirm any of this on its Web site, there are several indications that orders have...TechCrunch From ACM Opinion | December 28, 2009
Prith Banerjee discusses collaborating with universities, his startup experiences, and Hewlett-Packard Lab's approach to research and development.
Leah Hoffmann From Communications of the ACM | January 1, 2010
How platform adoption can be an important determinant of product and technological success.Michael Cusumano From Communications of the ACM | January 1, 2010
On July 17, 2008, Senator Barack Obama held a town hall meeting on national security at Purdue University. He and his panel covered issues of nuclear, biological...CERIAS From ACM Opinion | December 15, 2009
Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...Scientific American From ACM Opinion | December 8, 2009
Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...Scientific American From ACM Opinion | December 8, 2009
Frequent broken builds could be symptomatic of deeper problems within a development project.George V. Neville-Neil From Communications of the ACM | December 1, 2009
Trying to categorize computing as engineering, science, or math is fruitless; we have our own paradigm.Peter J. Denning, Peter A. Freeman From Communications of the ACM | December 1, 2009