Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband...Christopher S. Yoo From Communications of the ACM | August 1, 2010
ACM's Distinguished Member Recognition Program recognizes members in three categories: Educator, Engineer, and Scientist. Each category...Marc Snir, Telle Whitney From Communications of the ACM | July 1, 2010
Introducing CMD-IT, a new center focused on synergistic activities related to ethnic minorities and people with disabilities.Valerie E. Taylor From Communications of the ACM | July 1, 2010
Considering the precedent that could be established by approval of the controversial Google book settlement.Pamela Samuelson From Communications of the ACM | July 1, 2010
Technological change results in changes in expectations, in this case affecting the workplace.Jason Borenstein From Communications of the ACM | July 1, 2010
Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.Mari Sako From Communications of the ACM | July 1, 2010
Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...Simson L. Garfinkel, Lorrie Faith Cranor From Communications of the ACM | June 1, 2010
Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...François Lévêque From Communications of the ACM | June 1, 2010
Dear KV, I've been working with some code that generates massive data sets, and . . . I'm finding that more and more often I...George V. Neville-Neil From Communications of the ACM | June 1, 2010
Parallel computation is making a comeback after a quarter century of neglect. Past research can be put to quick use today.Peter J. Denning, Jack B. Dennis From Communications of the ACM | June 1, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
The second of a two-part series highlighting several of the world's museums dedicated to preserving, exhibiting, and elucidating computing history.William Aspray From Communications of the ACM | May 1, 2010
Studying the prevalence of mobile email addiction and the associated possible implications for organizations.Ofir Turel, Alexander Serenko From Communications of the ACM | May 1, 2010
Improving the research base for computing education requires securing competitive funding commitments.Cameron Wilson, Mark Guzdial From Communications of the ACM | May 1, 2010
Assessing the strengths, weaknesses, and general applicability of the computing-as-utility business model.
Erik Brynjolfsson, Paul Hofmann, John Jordan From Communications of the ACM | May 1, 2010
Once U.S. companies dominated Business Week's Most Innovative Companies ranking, outnumbering corporations outside of America. But for the first time ever, more...Business Week From ACM Opinion | April 19, 2010
Data structures are part of the foundation of computer science. It pays to revisit them from time to time.George V. Neville-Neil From Communications of the ACM | April 1, 2010