The USA Patriot Act, the law granting the government vast surveillance powers that was adopted in the wake of September 11, turns a decade old Wednesday. But...Wired From ACM Opinion | October 26, 2011
The Electronic Communications Privacy Act (ECPA) was signed into law on October 21, 1986. Although it was forward-looking at the time, ECPA's privacy protections...Arstechnica From ACM Opinion | October 24, 2011
How to address user information needs amidst a preponderance of data.Hector Garcia-Molina, Georgia Koutrika, Aditya Parameswaran From Communications of the ACM | November 1, 2011
Using the past 10 years of Taulbee Survey data to evaluate female student enrollment across varied academic institutions and departments.
Douglas Baumann, Susanne Hambrusch, Jennifer Neville From Communications of the ACM | November 1, 2011
Nine teacher-oriented faculty in computer science departments at research universities in the U.S. or Canada describe how their positions work, how they contribute...SIGCSE Teaching-Oriented Faculty Working Group From Communications of the ACM | November 1, 2011
"U.S. broadband is terrible" has become a familiar meme. Given the growing importance of broadband Internet connections, a poor broadband infrastructure would...Scott Wallsten From Communications of the ACM | November 1, 2011
What is at stake in United States v. Jones is nothing less than the continued vitality of the Fourth Amendment in the modern technological age.NJToday.net From ACM Opinion | October 13, 2011
If you bought an appliance in the last three years, odds are it was 'smart,' meaning it probably contains a wireless radio. Once hooked up to a smart meter, an...bclocalnews.com From ACM Opinion | October 12, 2011
"I never forget a face," goes the Marx Brothers one-liner, "but in your case, I'll be glad to make an exception." Unlike Groucho Marx, unfortunately, the cloud...The Atlantic From ACM Opinion | October 11, 2011
Big U.S. and European software companies are increasingly developing code for mainstream products overseas, especially in the Asia-Pacific region. But despite...The Diplomat From ACM Opinion | October 4, 2011
One of the biggest talks at this year's Black Hat Briefings was a presentation on the structural problem with digital certificate authorities by Moxie Marlinspike...Threatpost From ACM Opinion | October 3, 2011
For the past three years, a highly encrypted computer worm called Conficker has been spreading rapidly around the world. As many as 12 million computers have...National Public Radio From ACM Opinion | September 27, 2011
German cybersecurity expert Ralph Langner warns that U.S. utility companies are not yet prepared to deal with the threat presented by the Stuxnet computer worm...National Public Radio From ACM News | September 26, 2011
There’s a bill sitting on the desk of California Governor Jerry Brown, which if signed would ban police from searching the mobile devices of people arrested for...Wired From ACM Opinion | September 26, 2011
A proposal for a new cost-free open-access publication model for computer science papers.Dan S. Wallach From Communications of the ACM | October 1, 2011
There are two situations in software testing that scare testers: when they see "too many" defects and when they do not see "enough."Phillip G. Armour From Communications of the ACM | October 1, 2011