Verified coding techniques use mathematical proofs to ensure code is error-free and hacker-resistant. Can the approach revolutionize software?
Samuel Greengard From Communications of the ACM | July 1, 2021
Encrypted identification data on a smartcard or smartphone can deliver significant benefits while boosting security, but raise concerns about privacy and the potential...Samuel Greengard Commissioned by CACM Staff From ACM News | January 5, 2021
"Virtual meeting spaces greatly expand the possibilities for online communication—and, at their best, create an environment that parallels or exceeds real world...Samuel Greengard Commissioned by CACM Staff From ACM News | October 20, 2020