Seeking to improve the educational mechanisms for efficiently training large numbers of information security workers.Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou From Communications of the ACM | January 1, 2011
Privacy and confidentiality issues in cloud-based conference management systems reflect more universal themes.Mark D. Ryan From Communications of the ACM | January 1, 2011
You want to know how to get my attention?" Jason Kalich asked the audience rhetorically. "First off, don't bring me a good...Phillip G. Armour From Communications of the ACM | January 1, 2011
If there were a Mt. Rushmore of computer gaming, John Carmack's head would not only be on it, it would have the highest polygon count.Arstechnica From ACM Opinion | December 3, 2010
It’s a special week in America. All over the country, families are gathering in warmly lighted homes. They’re sitting down to fancy feasts at decorated tables...The New York Times From ACM Opinion | November 29, 2010
The increasing volume of research data highlights the need for reliable, cost-effective data storage and preservation at the national scale.Francine Berman From Communications of the ACM | December 1, 2010
Digital object repositories are on the cusp of resolving the long-standing problem of universal information access in the Internet.
Peter J. Denning, Robert E. Kahn From Communications of the ACM | December 1, 2010
In order to thrive and even survive in the worldwide marketplace of ideas and innovation, the U.S. must aggressively...Ann Quiroz Gates From Communications of the ACM | December 1, 2010
Imagine a CPU designed to issue and execute up to seven instructions per clock cycle, with a clock rate 10 times faster than the reigning supercomputer. This is...Mark Smotherman, Dag Spicer From Communications of the ACM | December 1, 2010
As the affordability and use of mobile phones in Africa increase, so too will security vulnerabilities.Seymour Goodman, Andrew Harris From Communications of the ACM | December 1, 2010
In a garage in Palo Alto, Calif., in the 1980s, some friends and I were the first humans to experience becoming avatars—that is, movable representations of ourselves...The Wall Street Journal From ACM Opinion | October 27, 2010
If we want more computer science students, and if we want computer scientists to be understood for what we are, we must clarify the message about computer science...Duncan Buell From Communications of the ACM | November 1, 2010
Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.Matt Welsh From Communications of the ACM | November 1, 2010
Evaluating governmental actions—and inactions—toward improving cyber security and addressing future challenges.Joel F. Brenner From Communications of the ACM | November 1, 2010
Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.Pamela Samuelson From Communications of the ACM | November 1, 2010
Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.
Stephen Cooper, Lance C. Pérez, Daphne Rainey From Communications of the ACM | November 1, 2010
Reading between the lines of the thematic gap between the supply and demand of online news.Pablo J. Boczkowski From Communications of the ACM | November 1, 2010
Adapting agile software development methodology toward more efficient management of academic research groups.Michael Hicks, Jeffrey S. Foster From Communications of the ACM | October 1, 2010