In order to thrive and even survive in the worldwide marketplace of ideas and innovation, the U.S. must aggressively...Ann Quiroz Gates From Communications of the ACM | December 1, 2010
Imagine a CPU designed to issue and execute up to seven instructions per clock cycle, with a clock rate 10 times faster than the reigning supercomputer. This is...Mark Smotherman, Dag Spicer From Communications of the ACM | December 1, 2010
As the affordability and use of mobile phones in Africa increase, so too will security vulnerabilities.Seymour Goodman, Andrew Harris From Communications of the ACM | December 1, 2010
The Air Force calls the situation "Launch Facilities Down." On Oct. 23, a Wyoming-based squadron of 50 nuclear-tipped intercontinental ballistic missiles (ICBMs)—enough...Time From ACM Opinion | November 12, 2010
Everyone knows that speed cameras work. They create the discipline of a lissom lady in leather and make sure everyone understands just what the rules are. In fact...CNET From ACM News | November 8, 2010
So you might have heard a story yesterday about a little magazine called Cooks Source. Up until then, you might never have heard of Cooks Source. But maybe you've...National Public Radio From ACM Opinion | November 5, 2010
With China expected to officially take the supercomputer performance crown next month, I asked an expert about the state of supercomputing in the U.S. and whether...CNET From ACM Opinion | November 1, 2010
The danger of allowing an advertising company to control the index of human knowledge is too obvious to ignore.The Guardian From ACM Opinion | November 1, 2010
If we want more computer science students, and if we want computer scientists to be understood for what we are, we must clarify the message about computer science...Duncan Buell From Communications of the ACM | November 1, 2010
Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.Matt Welsh From Communications of the ACM | November 1, 2010
Evaluating governmental actions—and inactions—toward improving cyber security and addressing future challenges.Joel F. Brenner From Communications of the ACM | November 1, 2010
Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.Pamela Samuelson From Communications of the ACM | November 1, 2010
Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.
Stephen Cooper, Lance C. Pérez, Daphne Rainey From Communications of the ACM | November 1, 2010
Talking to a computer security researcher about Stuxnet is like asking an art critic to describe the finer points of the Mona Lisa. The world's top cybersecurity...Slate From ACM Opinion | October 6, 2010
In an increasingly digital world, ironically, there may yet be a silver lining to the primitive nature of India's infrastructure: that it is not computer-controlled...Daily News and Analysis From ACM Opinion | October 5, 2010
Adapting agile software development methodology toward more efficient management of academic research groups.Michael Hicks, Jeffrey S. Foster From Communications of the ACM | October 1, 2010
An illustration of the problems caused by a lack of discipline in software development and our failure to apply what is known in the field.
David L. Parnas From Communications of the ACM | October 1, 2010
The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...Martin Campbell-Kelly From Communications of the ACM | October 1, 2010