From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
Virtually everyone in technology knows about Kevin Mitnick, who in the 1970s, '80s and '90s was a notorious fugitive hacker on the run from the FBI.
Computerworld From ACM Opinion | March 9, 2016
One afternoon last fall a Reddit user with the handle "FranktheShank1" was enjoying a new video game on his PlayStation 4.
Scientific American From ACM Opinion | March 8, 2016
The Apple-FBI standoff, where Apple is refusing to write special software that would help investigators crack into an iPhone of one of the San Bernardino shooters...NPR From ACM Opinion | March 8, 2016
A memory that’s stayed with me from my stint in the military nearly 50 years ago is a sign that my supply sergeant kept on his desk: "We’ve been working with less...The Atlantic From ACM Opinion | March 3, 2016
Let's say computers come for most of our jobs. This may not seem likely at the moment; computer scientists and economists offer wildly varying ideas for how deeply...The New York Times From ACM Opinion | March 3, 2016
In its legal fight against the FBI over iPhone security, Apple has made just about every argument it can credibly make.Technology Review From ACM Opinion | March 2, 2016
Apple's argument that a court order forcing it to write software code violates its First Amendment rights is legally sound and raises serious concerns, according...Daily Dot From ACM Opinion | March 2, 2016
Fred Kaplan has written a consistently eye-opening history of our government’s efforts to effectively manage our national security in the face of the largely open...The New York Times From ACM Opinion | March 1, 2016
There can't be many job titles out there cooler than "futurist." And earlier this week, I sat down with Sheryl Connelly, who holds that position at the Ford Motor...Ars Technica From ACM Opinion | March 1, 2016
Are Apple and other tech companies somehow against America's national security if they create uncrackable encryption software that government investigators or even...Wired From ACM Opinion | February 29, 2016
Imagine buying an internet-enabled surveillance camera, network attached storage device, or home automation gizmo, only to find that it secretly and constantly...Krebs On Security From ACM Opinion | February 29, 2016
Guidelines for the enterprise.
Maja Vukovic, Jim Laredo, Vinod Muthusamy, Aleksander Slominski, Roman Vaculin, Wei Tan, Vijay Naik, Ignacio Silva-Lepe, Arun Kumar, Biplav Srivastava, Joel W. Branch From Communications of the ACM | March 1, 2016
A recent celebration of 50 years of operating system research yields lessons for all professionals in designing offers for their clients.Peter J. Denning From Communications of the ACM | March 1, 2016