Learning to build virtual teams of people of diverse backgrounds is an urgent challenge.Peter J. Denning, Fernando Flores, Peter Luzmore From Communications of the ACM | March 1, 2010
Surveying the increasing variety and nature of ethical challenges encountered by computing researchers and practitioners.Rachelle Hollander From Communications of the ACM | March 1, 2010
The U.S. Supreme Court will narrow the universe of process innovations that can be patented to those that are "technological," but what will that mean for software...Pamela Samuelson From Communications of the ACM | March 1, 2010
How gaming, as the first media market to successfully transition toward media-as-a-service, is an exemplar for a similar evolutionary transition of content and...Tim Chang From Communications of the ACM | March 1, 2010
Despite the cancellation of NASA's back-to-the-moon program, the next steps on the moon will likely be taken sometime in the next decade under human control. It's...MSNBC From ACM Opinion | February 17, 2010
When Toyota Prius owners take their cars to the dealer under the company's latest recall, they'll likely be out of the shop in about 30 minutes. Even though the...Slate From ACM Opinion | February 16, 2010
There was no lack of, well, buzz about Google's new Buzz social-media platform last week, but more important were a series of moves that suggest the search giant...Time From ACM Opinion | February 16, 2010
If Iran's post-election uprising last summer was the world's first "Twitter revolution," the massive Jan. 12 earthquake in Haiti was the first "Twitter disaster...Foreign Policy From ACM Opinion | February 10, 2010
Here’s a typical “date night” with me and Hollywood: I don’t know what I want to see. Neither does Hollywood. But it bangs on my eyeballs and eardrums like Stanley...Wired From ACM Opinion | February 8, 2010
The company once known for its "don't be evil" motto is now in bed with the spy agency known for the mass surveillance of American citizens.
The National Security...Wired From ACM Opinion | February 5, 2010
Google may have threatened to leave China in order to keep us all from concluding that "the cloud" can't be secured. But isn't that precisely what we should conclude...Computerworld From ACM Opinion | February 1, 2010
President of People's Daily Online He Jiazheng speaks on Internet freedom:
The Google-China dispute shows a strategic position change of the United States. In...People's Daily Online From ACM Opinion | January 27, 2010
Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such as Gmail, in a politically motivated attempt...CNN From ACM Opinion | January 26, 2010
Over the past 40 years, the US has been dominating the world Internet as the core technique holder with an inherent advantage of being the cradle of the Internet...China Daily From ACM Opinion | January 26, 2010
In his July 2009 Communications editor's letter "Open, Closed, or Clopen Access?", editor-in-chief Moshe Vardi addressed...Michel Beaudouin-Lafon From Communications of the ACM | February 1, 2010
Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.
Douglas Maughan From Communications of the ACM | February 1, 2010
Why it is difficult — but essential — to monitor the effectiveness of security technologies.M. Angela Sasse From Communications of the ACM | February 1, 2010
After fizzling out over the past couple years, outsourcing is back in vogue. A new PricewaterhouseCoopers study shows outsourcing has roared back to life in the...Forbes.com From ACM Opinion | January 25, 2010