From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
In a fascinating note at Asymco, mobile analyst and ex-Nokian Horace Dediu details how people's taste in smartphones varies from place to place:Quartz From ACM Opinion | September 19, 2013
Apple is today releasing the much-anticipated iOS 7, and with it, the biggest overhaul of its mobile operating system since it debuted in 2007 with the original...CNET From ACM Opinion | September 18, 2013
When we reviewed iOS 6 a year ago, we called it a "spit-and-polish" release and stand by that assessment today.Ars Technica From ACM Opinion | September 18, 2013
Internet usage—especially microblogging on Sina Weibo, China’s largest Twitter-like social media site—is presenting new challenges and new attempts to meet them...The Wall Street Journal From ACM Opinion | September 18, 2013
Last week, I visited the MIT computer science department looking for a very famous cryptographer.Technology Review From ACM Opinion | September 17, 2013
By adding a fingerprint scanner to its newest mobile phone, Apple Inc. is offering a tantalizing glimpse of a future where your favorite gadget might become a biometric...Reuters From ACM Opinion | September 12, 2013
Apple injected a lot of marketing hyperbole into its claims about the wonders of 64-bit computing when it showed off the A7 processor at the heart of the new ...CNET From ACM Opinion | September 12, 2013
Two of the most influential venture capitalists in Silicon Valley, John Doerr and Vinod Khosla, weighed in on the current controversy government surveillance, contending...CNET From ACM Opinion | September 12, 2013
New startups looking for ways to keep their users secure should know one thing, a top Google security executive said Tuesday: "Passwords are dead."CNET From ACM Opinion | September 11, 2013
The latest iPhone has arrived, and along with it what may be the slickest integration of biometric security yet: A fingerprint scanner built seamlessly into the...Forbes From ACM Opinion | September 11, 2013
Exactly two decades ago, the RAND Corporation, an influential think tank, proclaimed that "cyberwar is coming!"New Scientist From ACM Opinion | September 10, 2013
The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...Bloomberg Businessweek From ACM Opinion | September 9, 2013
When Apple bought AuthenTec for its biometrics technology—reported as one of its most expensive purchases—there was a lot of speculation about how the company would...Wired From ACM Opinion | September 9, 2013
National Security Agency efforts to overcome encryption of online data weaken American security and undermine the government's duty to protect its own cyberinfrastructure...Indiana niversity From ACM Opinion | September 9, 2013
Now that we have enough details about how the NSA eavesdrops on the Internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems...The Guardian From ACM Opinion | September 6, 2013
If the Obama administration does conduct military strikes against Syria, as seems likely, it should use military cyber weapons at the earliest possible moment to...Defense One From ACM Opinion | September 6, 2013