Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...Jason Hong From BLOG@CACM | April 22, 2009 at 10:11 AM
So many processors on our desktops. Four cores, eight cores, soon we will see hundreds of cores. Almost all of them are going to be idle most of the time. If...Greg Linden From BLOG@CACM | April 9, 2009 at 12:48 PM
When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...Jason Hong From BLOG@CACM | March 18, 2009 at 10:23 AM
I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...Jason Hong From BLOG@CACM | March 5, 2009 at 02:43 PM
We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...Jason I. Hong From BLOG@CACM | February 13, 2009 at 02:43 PM