It’s not a revelation that as a society we’re often amiss when it comes to properly prioritizing technological issues. So it should be no surprise that one of…
Lauren Weinstein
Author Archives
Ma Bell’s Revenge: The Battle For Network Neutrality
Former FCC Chairman William Kennard recently characterized the Internet network neutrality debate as nothing but a battle between the "extremely wealthy" and…
Like most other technologies, RFID (Radio-Frequency IDentification) systems have pluses and minuses. In their most common applications, passive RFID tags enable rapid…
Fake ID: Batteries Not Included
It was only a matter of time. We’ve come to expect almost anything imaginable to be sold on late-night TV infomercials—from feel-good "health"…
The Wikipedia (WP; en.wikipedia.org/wiki/) applies the wiki technology (from a Hawaiian word for "quick") to the encyclopedia, a venerable form of knowledge…
The Best-Laid Plans: A Cautionary Tale For Developers
Once upon a time, Sony Computer Entertainment planned a new handheld device for gaming, music, and movies. Sony’s powerful new "PSP" (PlayStation…
Close Exposures of the Digital Kind
Sometimes the impacts of powerful technologies are relatively clear and pretty much expected. For example, we all realize that nuclear bombs are capable of impacting the…
Outsourcing (farming out production or other work) is not new. But when advanced technologies such as telecommunications and computing are applied to outsourcing, along…
Question: What’s worse than buggy software? Answer: Patches and upgrades that make things even worse. This is a dilemma critical to many applications. How should we…
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved