On July 17, 2008, Senator Barack Obama held a town hall meeting on national security at Purdue University. He and his panel covered issues of nuclear, biological...CERIAS From ACM Opinion | December 15, 2009
Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...Scientific American From ACM Opinion | December 8, 2009
Frequent broken builds could be symptomatic of deeper problems within a development project.George V. Neville-Neil From Communications of the ACM | December 1, 2009
Trying to categorize computing as engineering, science, or math is fruitless; we have our own paradigm.Peter J. Denning, Peter A. Freeman From Communications of the ACM | December 1, 2009
How government-industry collaboration can have far-reaching economic influences.Orna Berry, Yigal Grayeff From Communications of the ACM | December 1, 2009
Highlighting efforts and providing the rationale to increase the participation and success of underrepresented groups in computing.Richard E. Ladner From Communications of the ACM | December 1, 2009
The next biggest security threat may not be AK 47s or bomb blasts, but cyber terrorism. Terrorists can attack their enemy without stepping out of their home or...TechArena Community From ACM Opinion | November 11, 2009
A new report by a Washington policy think tank dismisses out of hand the idea that terrorist groups are currently launching cyber attacks and says that the recent...Threatpost From ACM Opinion | October 27, 2009
Members of the computer science community should become more involved in public service by becoming program managers at federal agencies, the opportunities and...Jonathan M. Smith From Communications of the ACM | November 1, 2009
Developing an effective pricing index is essential to understanding the value of broadband connectivity.Shane Greenstein From Communications of the ACM | November 1, 2009
How the U.S. Supreme Court's forthcoming decision in the Bilski v. Doll case is expected to affect existing and future software patents.Pamela Samuelson From Communications of the ACM | November 1, 2009
Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important...Butler Lampson From Communications of the ACM | November 1, 2009
A study from the RAND Corp. suggests the United States should focus on defending critical civilian and military computer networks from cyberattack, but does not...RAND Corp. From ACM TechNews | October 13, 2009
The U.S. Department of Homeland Security should be doing more to recruit top cyber security talent and develop a highly skilled workforce of cyber security workers...Federal Times From ACM CareerNews | September 14, 2009
Should computers be intuitive, requiring little to no learning or thinking? Is it even possible for them to be so?
“Nothing is intuitive,” said Slashdot blogger...LinuxInsider From ACM Opinion | September 25, 2009
C.A.R. Hoare revisits his past Communications article on the axiomatic approach to programming and uses it as a touchstone for the future.C.A.R. Hoare From Communications of the ACM | October 1, 2009
The venture capital industry, like financial services in general, has fallen on hard times. Part of the problem is that large payoffs...Michael Cusumano From Communications of the ACM | October 1, 2009
Conficker's alarming growth rate in early 2009 along with the apparent mystery surrounding its ultimate purpose had raised concern among...Phillip Porras From Communications of the ACM | October 1, 2009
Since its beginning, the computer industry has been through several major recessions, each occurring approximately five years...Martin Campbell-Kelly From Communications of the ACM | October 1, 2009