Researchers in China are developing new and more invasive techniques to surveil the Uyghurs minority. Some of their work is being supported by academia in the West...Coda From ACM Opinion | August 7, 2019
Seeking to improve rankings by utilizing more objective data and meaningful metrics.
Emery Berger, Stephen M. Blackburn, Carla Brodley, H. V. Jagadish, Kathryn S. McKinley, Mario A. Nascimento, Minjeong Shin, Kuansan Wang, Lexing Xie From Communications of the ACM | July 1, 2019
Many risks of catastrophic failures of critical infrastructures can be significantly reduced by relatively simple measures to increase resiliency.
Peter J. Denning, David Brin From Communications of the ACM | June 1, 2019
Total-system hardware and microarchitectural issues are becoming increasingly critical.
A. T. Markettos, R. N. M. Watson, S. W. Moore, P. Sewell, P. G. Neumann From Communications of the ACM | June 1, 2019
Seeking to increase awareness of WPA2 Enterprise network security technology flaws and reduce risk to users.
Alberto Bartoli, Eric Medvet, Andrea De Lorenzo, Fabiano Tarlao From Communications of the ACM | May 1, 2019
A swathe of the world is adopting China's vision for a tightly controlled internet over the unfettered American approach, a stunning ideological coup for Beijing...Bloomberg From ACM Opinion | April 15, 2019
As U.S. officials have pressured allies not to use networking gear from Chinese technology giant Huawei over spying concerns, President Trump has urged American...The Washington Post From ACM Opinion | April 10, 2019
Years into the robocalling frenzy, your phone probably still rings off the hook with "important information about your account," updates from the "Chinese embassy...Wired From ACM Opinion | April 8, 2019