Moshe Vardi uses his Editor's Letter in the May CACM to start up a debate on the future of conferences in CS. He mentions last year's Workshop on Organizing Workshops...Computational Complexity From ACM Opinion | May 29, 2009
Everything started last year, when a commission created by the Minister of Higher Education in Jordan considered computer engineers unqualified to teach computer...Yugi's Blog From ACM Opinion | May 29, 2009
Jon Kleinberg tallied a long list of awards and achievements before being named recipient of the 2008 ACM – Infosys Foundation Award in the Computer Sciences at...CIPS Connections From ACM Opinion | May 15, 2009
Craig Barrett joined Intel Corp. as a technology-development manager in 1974, and rose through the ranks to become chief executive officer in 1998. In 2005, he...The Arizona Republic From ACM Opinion | May 11, 2009
Dan Garcia, a lecturer in the EECS department at UC Berkeley, talks with Intel's Paul Steinberg and Contra Costa College Professor Tom Murphy about parallelism,...Blog Talk Radio From ACM Opinion | May 6, 2009
According to a project completed by second-year master's students at Harvard's Kennedy School of Government, government needs to be doing a better job of recruiting...Federal Computer Week From ACM CareerNews | April 22, 2009
The commercial opportunities of software as a service are widely hyped these days and many think SaaS is the future of software. That might be true in the medium...Martin Campbell-Kelly From Communications of the ACM | May 1, 2009
Differences in telecommunications regulation between the U.S. and the European Union are a key factor in viewing the debate over network neutrality legislation...Pierre Larouche From Communications of the ACM | May 1, 2009
The $787 billion U.S. economic stimulus package includes $2.5 billion in additional funding for the National Science Foundation and STEM (science, technology, engineering...The Heritage Foundation From ACM News | April 16, 2009
Minorities make up nearly half the players in today's Major League Baseball. Not so for women in computer science. They're not integrated because computer science...Âbiquity From ACM News | April 10, 2009
While Russia and the U.S. spend billions on heavy military hardware, China is concentrating on education and hacking. The U.S. is still outsourcing computer work...NewsBlaze From ACM News | March 31, 2009
A STEM (Science, Technology, Engineering and Mathematics) education initiative is long overdue! Data on science education in America collected over the past few...StarTribune.com From ACM Careers | March 31, 2009
College students must be shown that computer science is social, relevant, important, and caring. The way computer science is taught can hold students' interest...Michael Buckley From Communications of the ACM | April 1, 2009
Some advice for those doing the advising (and what the advisors can learn from the advisees).Jeffrey D. Ullman From Communications of the ACM | March 1, 2009
This Viewpoint boils down into a few magazine pages what I've learned in my 32 years of mentoring Ph.D. students.David A. Patterson From Communications of the ACM | March 1, 2009
Can you resell software even if the package says you can't? What are the implications for copyright law of the U.S. Supreme Court's unanimous June 2008 decision...Pamela Samuelson From Communications of the ACM | March 1, 2009
Software engineering continues to be dogged by claims it is not engineering. Adopting a computer-systems view that embraces hardware, software, and user environment...Peter J. Denning, Richard D. Riehle From Communications of the ACM | March 1, 2009
A discussion of divergent paths to unrestricted access of content and applications via the Internet.
Barbara van Schewick, David Farber From Communications of the ACM | February 1, 2009
Recounting problems still associated with election integrity, transparency, and accountability.
Peter G. Neumann From Communications of the ACM | February 1, 2009
Governments concerned with national-security threats use the Internet to gather intelligence from communications traffic that transits local facilities. This surveillance...Kristina Irion From Communications of the ACM | February 1, 2009