The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...Martin Campbell-Kelly From Communications of the ACM | October 1, 2010
Should researchers focus on designing new network architectures or improving the current Internet?Jennifer Rexford, Constantine Dovrolis From Communications of the ACM | September 1, 2010
An overview of a new set of legal principles for software contracts developed by the American Law Institute.Robert A. Hillman, Maureen A. O'Rourke From Communications of the ACM | September 1, 2010
The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.Samir Chopra From Communications of the ACM | August 1, 2010
Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband...Christopher S. Yoo From Communications of the ACM | August 1, 2010
Software is an integral component of a range of devices that perform critical, lifesaving functions and basic daily tasks. As patients grow more reliant on computerized...The Software Freedom Law Center From ACM Opinion | July 23, 2010
HTML5, the next version of the markup language used to build Web pages, has attracted attention for its ability to show video inside a Web browser without using...Technology Review From ACM Opinion | July 22, 2010
One theme I ran into over and over while writing about the periodic table was the future of energy and the question of which element or elements will replace carbon...Slate From ACM Opinion | July 19, 2010
Technological change results in changes in expectations, in this case affecting the workplace.Jason Borenstein From Communications of the ACM | July 1, 2010
Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.Mari Sako From Communications of the ACM | July 1, 2010
Dear KV, I've been working with some code that generates massive data sets, and . . . I'm finding that more and more often I...George V. Neville-Neil From Communications of the ACM | June 1, 2010
Parallel computation is making a comeback after a quarter century of neglect. Past research can be put to quick use today.Peter J. Denning, Jack B. Dennis From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010