Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...Mari Sako From Communications of the ACM | July 1, 2011
More often than not, the Iridium satellite phone system is remembered as one of the great telecom flameouts of the 1990s. It almost became a literal one: At one...AllThingsD From ACM Opinion | June 21, 2011
"Cars 2" director John Lasseter talked with The Wall Street Journal in his office at the Emeryville headquarters of Pixar Animation Studios, where he is chief...The Wall Street Journal From ACM Opinion | June 20, 2011
In justifying U.S. involvement in Libya, the Obama administration cited the "responsibility to protect" citizens of other countries when their governments engage...The Wall Street Journal From ACM Opinion | June 20, 2011
Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...Symantec From ACM News | June 17, 2011
There aren’t many technology companies around who can claim to be 100 years old. You're probably hearing that a lot as media outlets report on the anniversary...AllThingsD From ACM Opinion | June 17, 2011
Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...CNET From ACM News | June 15, 2011
When Colin Hughes was about 11 years old his parents brought home a rather strange toy. It wasn't colorful or cartoonish; it didn't seem to have any lasers or...The Atlantic From ACM Opinion | June 14, 2011
Online piracy is a huge business. A recent study found that Web sites offering pirated digital content or counterfeit goods, like illicit movie downloads or bootleg...The New York Times From ACM Opinion | June 10, 2011
David Ferrucci’s official title is "IBM Fellow and Leader of the Semantic Analysis and Integration Department at IBM's T.J. Watson Research Center." But to the...The Computing Community Consortium Blog From ACM News | June 8, 2011
RSA Security is offering to provide security monitoring or replace its well-known SecurID tokens—devices used by millions of corporate workers to securely log...The Wall Street Journal From ACM News | June 7, 2011
When Jeff Moss, popularly known as the Dark Tangent, started holding underground hacker conferences in Las Vegas he knew he had a problem. All previous gatherings...The Guardian From ACM Opinion | June 6, 2011
Major corporations have made serious mistakes with information security recently, resulting in spectacular failures to protect business and customer records....Technology Review From ACM News | June 3, 2011
Dr. Regina Dugan is director of the Defense Advance Research Projects Agency, where she researches, develops, and demonstrates high-risk, high-payoff projects...AllThingsD From ACM News | June 2, 2011
NASA is no longer sending commands to the Spirit rover on Mars, but the long-silent robot still has a few more chances to phone home. Not that anyone is expecting...MSNBC From ACM News | June 1, 2011
Vint Cerf is one of the most recognized network engineers of all time. He is often referred to as one of the "fathers of the Internet" for his groundbreaking...Network World From ACM News | June 1, 2011
The reauthorization of the Patriot Act looks like a forgone conclusion. But next month, a bipartisan band of legislators will try to mitigate a different kind...Wired From ACM News | May 31, 2011
In today's hyper-networked world, where anyone can reach anybody at any time, John Lasseter is something of an anachronism. Though he is routinely armed with...The Wall Street Journal From ACM Opinion | May 27, 2011