Imagine a CPU designed to issue and execute up to seven instructions per clock cycle, with a clock rate 10 times faster than the reigning supercomputer. This is...Mark Smotherman, Dag Spicer From Communications of the ACM | December 1, 2010
As the affordability and use of mobile phones in Africa increase, so too will security vulnerabilities.Seymour Goodman, Andrew Harris From Communications of the ACM | December 1, 2010
In a garage in Palo Alto, Calif., in the 1980s, some friends and I were the first humans to experience becoming avatars—that is, movable representations of ourselves...The Wall Street Journal From ACM Opinion | October 27, 2010
If we want more computer science students, and if we want computer scientists to be understood for what we are, we must clarify the message about computer science...Duncan Buell From Communications of the ACM | November 1, 2010
Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.Matt Welsh From Communications of the ACM | November 1, 2010
Evaluating governmental actions—and inactions—toward improving cyber security and addressing future challenges.Joel F. Brenner From Communications of the ACM | November 1, 2010
Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.Pamela Samuelson From Communications of the ACM | November 1, 2010
Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.
Stephen Cooper, Lance C. Pérez, Daphne Rainey From Communications of the ACM | November 1, 2010
Reading between the lines of the thematic gap between the supply and demand of online news.Pablo J. Boczkowski From Communications of the ACM | November 1, 2010
"In the 1960s I think that in some sense the present was actually about three or four years long," he said, "because in three or four years relatively little...BBC News From ACM Opinion | October 12, 2010
The saga of Steven P. Jobs is so well known that it has entered the nation’s mythology: he’s the prodigal who returned to Apple in 1997, righted a listing ship...The New York Times From ACM Opinion | October 6, 2010
Adapting agile software development methodology toward more efficient management of academic research groups.Michael Hicks, Jeffrey S. Foster From Communications of the ACM | October 1, 2010
Combining new consumer devices and Internet platforms with online services and content is proving to be a successful strategy.
Michael A. Cusumano From Communications of the ACM | October 1, 2010
The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...Martin Campbell-Kelly From Communications of the ACM | October 1, 2010
A study published Monday drew on a host of metrics to conclude something we all already knew: The media covers Apple more than any other company.Wired From ACM Opinion | September 28, 2010
Palo Alto Research Center research fellow David Biegelsen, who has been at Xerox's legendary R&D lab from the beginning, reflected on being at the forefront of...Scientific American From ACM Opinion | September 24, 2010
Everyone and his Big Brother wants to log your browsing habits, the better to build a profile of who you are and how you live your life—online and off. Search...Time From ACM Opinion | September 14, 2010
Should researchers focus on designing new network architectures or improving the current Internet?Jennifer Rexford, Constantine Dovrolis From Communications of the ACM | September 1, 2010