As the affordability and use of mobile phones in Africa increase, so too will security vulnerabilities.Seymour Goodman, Andrew Harris From Communications of the ACM | December 1, 2010
The origins of our Webified age were hardly auspicious. Two decades ago, Tim Berners-Lee, a British software programmer at the CERN physics-research laboratory...The New York Times From ACM Opinion | November 15, 2010
Peak performance doesn't equal sustained performance, and the NVIDIA GPUs in the Tianhe 1A are especially bad at the latter.Technology Review From ACM Opinion | November 8, 2010
Everyone knows that speed cameras work. They create the discipline of a lissom lady in leather and make sure everyone understands just what the rules are. In fact...CNET From ACM News | November 8, 2010
So you might have heard a story yesterday about a little magazine called Cooks Source. Up until then, you might never have heard of Cooks Source. But maybe you've...National Public Radio From ACM Opinion | November 5, 2010
With China expected to officially take the supercomputer performance crown next month, I asked an expert about the state of supercomputing in the U.S. and whether...CNET From ACM Opinion | November 1, 2010
The danger of allowing an advertising company to control the index of human knowledge is too obvious to ignore.The Guardian From ACM Opinion | November 1, 2010
In a garage in Palo Alto, Calif., in the 1980s, some friends and I were the first humans to experience becoming avatars—that is, movable representations of ourselves...The Wall Street Journal From ACM Opinion | October 27, 2010
If we want more computer science students, and if we want computer scientists to be understood for what we are, we must clarify the message about computer science...Duncan Buell From Communications of the ACM | November 1, 2010
Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.Matt Welsh From Communications of the ACM | November 1, 2010
Evaluating governmental actions—and inactions—toward improving cyber security and addressing future challenges.Joel F. Brenner From Communications of the ACM | November 1, 2010
Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.Pamela Samuelson From Communications of the ACM | November 1, 2010
Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.
Stephen Cooper, Lance C. Pérez, Daphne Rainey From Communications of the ACM | November 1, 2010
Reading between the lines of the thematic gap between the supply and demand of online news.Pablo J. Boczkowski From Communications of the ACM | November 1, 2010
Five years ago, having only recently arrived at the company, I wrote The Internet Services Disruption in order to kick off a major change management process across...ozzie.net From ACM Opinion | October 25, 2010
"In the 1960s I think that in some sense the present was actually about three or four years long," he said, "because in three or four years relatively little...BBC News From ACM Opinion | October 12, 2010
Research suggests that the approach that worked with a few large companies with aligned interests needs revisiting in the Internet age.MIT News Office From ACM Opinion | October 8, 2010
Talking to a computer security researcher about Stuxnet is like asking an art critic to describe the finer points of the Mona Lisa. The world's top cybersecurity...Slate From ACM Opinion | October 6, 2010