Madison C. Allen Kuyenga, Eleanor R. Glover Gladney, Michael Lachney, Marwin McKnight, Theodore S. Ransaw, Dominick Sanders, Aman Yadav| October 1, 2023
It's all about human-robot interaction in this more interpersonal sense, like you saw in Star Wars. Until then, the way we reacted with robots was [by] remote...Slate From ACM Opinion | August 8, 2011
Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...China Daily From ACM News | August 5, 2011
The word "hacker" evokes all kinds of scary images. But Jeff Moss says hackers are exactly what the world needs more of, because they can make the Internet safer...CNN From ACM News | August 3, 2011
The mysteries of infinity could lead us to a fantastic structure above and beyond mathematics as we know it.New Scientist From ACM Opinion | August 2, 2011
Nathan Myhrvold is a genius and a polymath. He made hundreds of millions of dollars as Microsoft's chief technology officer, he's discovered dinosaur fossils,...National Public Radio From ACM News | July 28, 2011
Bob Young knows about open source and innovation. He's co-founder and former CEO of Red Hat. Founder and CEO of Lulu. Here are the lessons he's learned from open...opensource.com From ACM Opinion | July 28, 2011
Bob Young knows about open source and innovation. He's co-founder and former CEO of Red Hat. Founder and CEO of Lulu. Here are the lessons he's learned from open...opensource.com From ACM Opinion | July 28, 2011
The Norway killer allegedly spent 200 hours searching the Internet for 'how to make a bomb.' Could Google have traced him?Special Broadcasting Service From ACM Opinion | July 28, 2011
The Norway killer allegedly spent 200 hours searching the Internet for 'how to make a bomb.' Could Google have traced him?Special Broadcasting Service From ACM Opinion | July 28, 2011
Take a look around you. The walls, the chair you're sitting in, your own body—they all seem real and solid. Yet there is a possibility that everything we see...New Scientist From ACM Opinion | July 28, 2011
Twitter users have a way of self-identifying gratuitous complaints they make. They use the hashtag first-world problems. As in, "I can't believe Netflix is doubling...DesMoinesRegister.com From ACM Opinion | July 27, 2011
University of Alabama at Birmingham social psychologist Rex A. Wright explains why some people do not view phone hacking as unethical and why those that see it...niversity of Alabama at Birmingham From ACM Opinion | July 27, 2011
It's time to re-examine how we use, or overuse, the words "hack" and "hacker." They're relied on far too often to describe all kinds of activities that don't...Fast Company From ACM Opinion | July 25, 2011
Openness is the Internet's great strength—and weakness. With powerful forces carving it up, is its golden age coming to an end?New Scientist From ACM News | July 21, 2011
Rodney C. Adkins oversees 50,000 employees and is responsible for $18 billion in revenue as senior vice president and group executive for systems and technology...The Wall Street Journal From ACM News | July 21, 2011
In a comprehensive Q&A, Peter Denning, the editor-in-chief of Ubiquity, offers his thoughts on the future of computer science and discusses the art of making predictions...biquity From ACM CareerNews | May 1, 2011
When we think of being connected to the Internet, our minds immediately shift to our computers, phones, and most recently tablets. This week at Cisco live, I...Cisco Systems From ACM Opinion | July 20, 2011
Leadership is a core competency of the officers, warrant officers, and non-commissioned officers across the military services. A principle tenant of leadership...Small Wars Journal From ACM Opinion | July 20, 2011
The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice...Joseph Y. Halpern, David C. Parkes From Communications of the ACM | August 1, 2011