Madison C. Allen Kuyenga, Eleanor R. Glover Gladney, Michael Lachney, Marwin McKnight, Theodore S. Ransaw, Dominick Sanders, Aman Yadav| October 1, 2023
The nation’s second-ranking military official said Thursday that the U.S. approach to protecting its computer systems was "too predictable" and failed to penalize...The Washington Post From ACM News | July 15, 2011
South Korea will ban school paper textbooks and replace them with electronic tablets by 2014, which should alarm other nations. South Korea's students ranked No...The Miami Herald From ACM Opinion | July 14, 2011
In a speech at the International Economic Association 16th World Congress in Beijing, Andrew Haldane, Executive Director for Financial Stability and member of...Bank of England From ACM News | July 13, 2011
The size and scope of cybersecurity needs to account for the integration of information technology into everything, says Robert Brammer with the Northrop Grumman...GovInfoSecurity.com From ACM TechNews | July 12, 2011
The United States may seriously want to consider creating a new Internet infrastructure to reduce the threat of cyberattacks, said Michael Hayden, President George...NextGov From ACM News | July 12, 2011
The United States may seriously want to consider creating a new Internet infrastructure to reduce the threat of cyberattacks, said Michael Hayden, President George...NextGov From ACM News | July 12, 2011
The history of Internet security is both worrisome and instructive. When the first virus — the "Morris worm"—was launched in 1988, the Internet was a closed system...The Washington Post From ACM Opinion | July 11, 2011
The Supreme Court ended its term with a high-profile ruling that violent video games are protected by the First Amendment, but a bigger technology decision could...Time From ACM News | July 11, 2011
In April 1981, the National Aeronautics and Space Administration launched a space shuttle program meant to take astronauts, cargo, research experiments and military...NPR From ACM Opinion | July 8, 2011
Forty years ago, I wrote an article for Technology Review titled "Shall We Build the Space Shuttle?" Now, with the 135th and final flight of the shuttle at hand...Technology Review From ACM Opinion | July 6, 2011
It was early May when LulzSec's profile skyrocketed after a hack on the giant Sony corporation. LulzSec's name comes from Lulz, a corruption of LOL, often denoting...New Scientist From ACM News | July 5, 2011
A professor of digital humanities at Dartmouth College, Mary Flanagan has spent her career thinking critically about a topic that most of us take for granted: Play...Leah Hoffmann From ACM News | July 5, 2011
Google technology evangelist Vint Cerf recently suggested that increasing bandwidth capacity exponentially could lead to more efficient ways of streaming media...IDG News Service From ACM TechNews | June 30, 2011
Homeland Security's Bruce McConnell on the government's role in helping companies fight online attacks.The Wall Street Journal From ACM Opinion | June 28, 2011
Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your...Electronic Frontier Foundation From ACM News | June 27, 2011
After just 50 days, the group said it was ceasing individual operations. Why, when you might have thought things were going so well?The Guardian From ACM Opinion | June 27, 2011
Marko Rodriguez and Peter Neubauer, the leaders of the TinkerPop open-source graph software initiative, discuss the project, its members, and its goals.ODBMS Industry Watch From ACM Opinion | June 24, 2011
Marko Rodriguez and Peter Neubauer, the leaders of the TinkerPop open-source graph software initiative, discuss the project, its members, and its goals.ODBMS Industry Watch From ACM Opinion | June 24, 2011
For several months, EFF has been following the movement around Bitcoin, an electronic payment system that touts itself as "the first decentralized digital currency...Electronic Frontier Foundation From ACM Opinion | June 23, 2011