An assessment of the relative achievements in IT infrastructure, firms, and innovation in China.
Ping Gao, Jiang Yu From Communications of the ACM | August 1, 2010
Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband...Christopher S. Yoo From Communications of the ACM | August 1, 2010
A friend who teaches at a well-known eastern university told me recently that plagiarism was turning him into a cop.The New York Times From ACM Opinion | July 14, 2010
Recently, book publishers got some good news. Researchers gave 852 disadvantaged students 12 books (of their own choosing) to take home at the end of the school...The New York Times From ACM Opinion | July 12, 2010
If you’re ambivalent about a career in computer science, you should read Joel Adams’ The Market For Computing Careers.Jack Rosenberger From ACM Opinion | July 1, 2010
ACM's Distinguished Member Recognition Program recognizes members in three categories: Educator, Engineer, and Scientist. Each category...Marc Snir, Telle Whitney From Communications of the ACM | July 1, 2010
Introducing CMD-IT, a new center focused on synergistic activities related to ethnic minorities and people with disabilities.Valerie E. Taylor From Communications of the ACM | July 1, 2010
Considering the precedent that could be established by approval of the controversial Google book settlement.Pamela Samuelson From Communications of the ACM | July 1, 2010
Technological change results in changes in expectations, in this case affecting the workplace.Jason Borenstein From Communications of the ACM | July 1, 2010
Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.Mari Sako From Communications of the ACM | July 1, 2010
If you’re reading this blog post on a computer, mobile phone or e-reader, please stop what you’re doing immediately. You could be making yourself stupid. And whatever...The New York Times From ACM Opinion | June 11, 2010
Amid the silly videos and spam are the roots of a new reading and writing culture, says Clay Shirky.The Wall Street Journal From ACM Opinion | June 9, 2010
Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...Simson L. Garfinkel, Lorrie Faith Cranor From Communications of the ACM | June 1, 2010
Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...François Lévêque From Communications of the ACM | June 1, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
In their continued quest to plumb the mysterious depths of human interactions, some sociologists have stopped watching people—and started watching their avatars...Ars Technica From ACM Opinion | May 10, 2010
Bruno Bachimont, scientific advisor of the Department of Research and Innovation at France's Institut National de l'Audiovisuel, discusses the constructive mix...Integrated Science Education From ACM Opinion | May 6, 2010