President of People's Daily Online He Jiazheng speaks on Internet freedom:
The Google-China dispute shows a strategic position change of the United States. In...People's Daily Online From ACM Opinion | January 27, 2010
Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such as Gmail, in a politically motivated attempt...CNN From ACM Opinion | January 26, 2010
Over the past 40 years, the US has been dominating the world Internet as the core technique holder with an inherent advantage of being the cradle of the Internet...China Daily From ACM Opinion | January 26, 2010
In his July 2009 Communications editor's letter "Open, Closed, or Clopen Access?", editor-in-chief Moshe Vardi addressed...Michel Beaudouin-Lafon From Communications of the ACM | February 1, 2010
Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.
Douglas Maughan From Communications of the ACM | February 1, 2010
Why it is difficult — but essential — to monitor the effectiveness of security technologies.M. Angela Sasse From Communications of the ACM | February 1, 2010
After fizzling out over the past couple years, outsourcing is back in vogue. A new PricewaterhouseCoopers study shows outsourcing has roared back to life in the...Forbes.com From ACM Opinion | January 25, 2010
How platform adoption can be an important determinant of product and technological success.Michael Cusumano From Communications of the ACM | January 1, 2010
The winner of the inaugural Ken Kennedy Award, Francine Berman answers questions about her career, the reasons for her success, and the most important lessons she's...Jack Rosenberger From ACM Opinion | December 4, 2009
Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...Scientific American From ACM Opinion | December 8, 2009
Trying to categorize computing as engineering, science, or math is fruitless; we have our own paradigm.Peter J. Denning, Peter A. Freeman From Communications of the ACM | December 1, 2009
How government-industry collaboration can have far-reaching economic influences.Orna Berry, Yigal Grayeff From Communications of the ACM | December 1, 2009
Highlighting efforts and providing the rationale to increase the participation and success of underrepresented groups in computing.Richard E. Ladner From Communications of the ACM | December 1, 2009
Government-funded basic and applied research at U.S. universities has been one of the pillars of the U.S. high tech sector. But at least in information technology...Harvard Business Publishing From ACM Opinion | November 4, 2009
Members of the computer science community should become more involved in public service by becoming program managers at federal agencies, the opportunities and...Jonathan M. Smith From Communications of the ACM | November 1, 2009
Developing an effective pricing index is essential to understanding the value of broadband connectivity.Shane Greenstein From Communications of the ACM | November 1, 2009
How the U.S. Supreme Court's forthcoming decision in the Bilski v. Doll case is expected to affect existing and future software patents.Pamela Samuelson From Communications of the ACM | November 1, 2009
Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important...Butler Lampson From Communications of the ACM | November 1, 2009