Amid the silly videos and spam are the roots of a new reading and writing culture, says Clay Shirky.The Wall Street Journal From ACM Opinion | June 9, 2010
The Obama administration's progress toward the goal of making the U.S. digital infrastructure "secure, trustworthy, and resilient" has been sluggish due to the...The Washington Post From ACM TechNews | June 3, 2010
Extraordinary cases make bad law. In a sense, Armando Galarraga’s non-perfect perfect game, spoiled by an umpire’s call on what should have been the 27th out, offers...The New York Times From ACM Opinion | June 3, 2010
On Wednesday I attended a Silicon Valley press conference dressed as a robot. Actually I was physically in New York City and virtually in Menlo Park, Calif. For...The New York Times From ACM Opinion | May 27, 2010
We did not create life from scratch: we transformed existing life into new life. Nor did we design and build a new chromosome from scratch. Rather, using only digitised...New Scientist From ACM Opinion | May 27, 2010
Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...Simson L. Garfinkel, Lorrie Faith Cranor From Communications of the ACM | June 1, 2010
Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...François Lévêque From Communications of the ACM | June 1, 2010
Dear KV, I've been working with some code that generates massive data sets, and . . . I'm finding that more and more often I...George V. Neville-Neil From Communications of the ACM | June 1, 2010
Parallel computation is making a comeback after a quarter century of neglect. Past research can be put to quick use today.Peter J. Denning, Jack B. Dennis From Communications of the ACM | June 1, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
Six years ago, we built Facebook around a few simple ideas. People want to share and stay connected with their friends and the people around them. If we give people...The Washington Post From ACM Opinion | May 26, 2010
The Web is a teeming commercial city. It's haphazardly planned. Its public spaces are mobbed, and signs of urban decay abound in broken links and abandoned projects...The New York Times From ACM Opinion | May 24, 2010
One of the great conundrums of war and technology is the odd fact that there is no such thing as a permanent first-mover advantage.Popular Mechanics From ACM Opinion | May 21, 2010
Telepathic helmets. Grid-computing swarms of cyborg insects, some for surveillance, some with lethal stingers. New cognitive-enhancement drugs. (What? AdderallProvigil...Slate From ACM Opinion | May 20, 2010
New research by the Electronic Frontier Foundation (EFF) has found that an overwhelming majority of web browsers have unique signatures--creating identifiable "fingerprints"...Electronic Frontier Foundation From ACM Opinion | May 19, 2010
In a brilliant column published 16 years ago, the Italian philosopher Umberto Eco explained the difference between Apple and Microsoft in terms of the divide between...Slate From ACM Opinion | May 17, 2010
All Americans--whether brown, white, or black--should be required to carry a passport showing they are red, white, and blue.Newsweek From ACM Opinion | May 14, 2010
The headaches of Web application development are being compounded by the ever-proliferating morass of Web standards, frameworks, and tools.InfoWorld From ACM TechNews | May 13, 2010