The best way to think about Aereo, the company at the center of this week's Supreme Court battle over the future of computing, is as an example of legal performance...The New York Times From ACM Opinion | April 24, 2014
A quantum computer is a device that could exploit the weirdness of the quantum world to solve certain specific problems much faster than we know how to solve them...PBS From ACM News | April 22, 2014
Flash Boys explores the world of high-frequency trading, a scheme in which traders use ultra-fast network connections to sniff out the intentions of other, slower...Wired From ACM Opinion | April 22, 2014
Five weeks into the search for missing Malaysia Airlines Flight 370, more than $30 million has been spent scouring great swatches of the southern Indian Ocean.Slate From ACM Opinion | April 21, 2014
The Heartbleed bug crushed our faith in the secure Web, but a world without the encryption software that Heartbleed exploited would be even worse.Wired From ACM Opinion | April 21, 2014
EFF has long advocated for websites to support HTTPS instead of plain HTTP to encrypt and authenticate data transmitted on the Internet.Electronic Frontier Foundation From ACM Opinion | April 16, 2014
Self-driving cars, extreme life extension, and global wifi provided by weather balloons: Google makes projects that sound like science fiction into reality at its...The Atlantic From ACM Opinion | April 16, 2014
When Wally Pfister's Transcendence is released on April 17, millions of moviegoers will be asking themselves, "Could we really upload Johnny Depp into a computer...Slate From ACM Opinion | April 14, 2014
The developer who introduced the "Heartbleed" vulnerability to the open-source code used by thousands of websites has told the Guardian it was an "oversight"—but...The Guardian From ACM Opinion | April 11, 2014
The Moscow-based computer security firm Kaspersky Lab has analyzed major new kinds of malware, including Stuxnet, which four years ago was revealed to have damaged...Technology Review From ACM Opinion | April 11, 2014
The cryptography expert Bruce Schneier, who has been writing about computer security for more than fifteen years, is not given to panic or hyperbole.The New Yorker From ACM Opinion | April 10, 2014
When he was in elementary school, Scott Aaronson, like many mathematically precocious kids of his generation, dreamed of making his own video games.MIT News Office From ACM Opinion | April 7, 2014
A small group of financial firms are using their technological superiority to skim the top off the market, Michael Lewis claims in his new book "Flash Boys."The Washington Post From ACM Opinion | April 7, 2014
The Internet of Things has tremendous potential but also poses a tremendous risk if the underlying security of Internet of Things devices is not taken into account...The Security Ledger From ACM Opinion | April 3, 2014
The U.S. government has long complained about Chinese hacking and cyberattacks, but new documents show that the National Security Agency managed to penetrate the...NPR From ACM Opinion | April 3, 2014
The Constitution gives Congress the power to grant inventors a temporary monopoly over their creations to "promote the progress of science and useful arts."The New York Times From ACM Opinion | March 31, 2014
For the past few weeks the world's attention has been focussed on the lost Malaysia Airlines plane and its 239 passengers and crew that has apparently crashed in...New Scientist From ACM Opinion | March 28, 2014