Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...Simson L. Garfinkel, Lorrie Faith Cranor From Communications of the ACM | June 1, 2010
Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...François Lévêque From Communications of the ACM | June 1, 2010
Dear KV, I've been working with some code that generates massive data sets, and . . . I'm finding that more and more often I...George V. Neville-Neil From Communications of the ACM | June 1, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
Additional personnel alone cannot address the lapses in the U.S. intelligence community, which also needs state-of-the-art information technologies that enhance...Defense News From ACM TechNews | April 27, 2010
The second of a two-part series highlighting several of the world's museums dedicated to preserving, exhibiting, and elucidating computing history.William Aspray From Communications of the ACM | May 1, 2010
Studying the prevalence of mobile email addiction and the associated possible implications for organizations.Ofir Turel, Alexander Serenko From Communications of the ACM | May 1, 2010
Improving the research base for computing education requires securing competitive funding commitments.Cameron Wilson, Mark Guzdial From Communications of the ACM | May 1, 2010
Assessing the strengths, weaknesses, and general applicability of the computing-as-utility business model.
Erik Brynjolfsson, Paul Hofmann, John Jordan From Communications of the ACM | May 1, 2010
Incorporating the consideration of privacy into the ongoing debate concerning network neutrality.Paul Ohm From Communications of the ACM | April 1, 2010
To become an industry platform, vendors must open their infrastructure technology to other product companies.
Michael Cusumano From Communications of the ACM | April 1, 2010
The fundamental assumptions of international development are changing, increasingly putting the tools for a digital economy into the hands of the world's poor.
...Richard Heeks From Communications of the ACM | April 1, 2010
The Internet Age is upon us. But rather than circulating online, the 23rd Decennial Census stuck with the tried-and-true, and flooded the U.S. Postal Service March...Scientific American From ACM Opinion | March 26, 2010
Few geeks are unfamiliar with the concept of the "Mythical Man-Month" from Fred Brooks' classic software engineering tome by the same name. It's a classic for good...LinuxInsider From ACM Opinion | March 22, 2010
Seeking funding for current and future computing initiatives requires both a strong argument and a broad community of supporters.Cameron Wilson, Peter Harsha From Communications of the ACM | March 1, 2010
Emphasizing the importance of creating more programs and investing more funding toward the goal of developing minority faculty at research universities.
Richard Tapia From Communications of the ACM | March 1, 2010