Software developers should use empirical methods to analyze their designs to predict how working systems will behave.
Clayton T. Morrison, Richard T. Snodgrass From Communications of the ACM | June 1, 2011
Good software design is never easy, but stopping too soon makes the job more difficult.David Lorge Parnas From Communications of the ACM | June 1, 2011
One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...Phillip G. Armour From Communications of the ACM | June 1, 2011
Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.
Peter J. Denning, Dennis J. Frailey From Communications of the ACM | June 1, 2011
The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...Ari Schwartz From Communications of the ACM | June 1, 2011
Without library privacy, individuals might not engage in free and open inquiry for fear that their interactions with the library will be used against them.Harvard Law School From ACM Opinion | May 20, 2011
One of the joys of the last few years has been the flood of real-world data sets being released by all sorts of organizations. These usually involve some record...O'Reilly Radar From ACM News | May 18, 2011
The best way to improve the U.S. economy fast is to poach entrepreneurs from the rest of the world. So why do we make it so difficult for them to immigrate?Slate From ACM Opinion | May 11, 2011
A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...The New York Times From ACM Opinion | May 10, 2011
In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services...San Jose Mercury news From ACM News | May 6, 2011
Sony's apparent difficulty in figuring out the extent of the damage from the recent intrusion into its PlayStation Network, while frustrating for those affected...Computerworld From ACM Opinion | April 28, 2011
Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...The New York Times From ACM Opinion | April 25, 2011
Highlighting the significance of the often overlooked underlying software used to produce research results.Juan A. Añel From Communications of the ACM | May 1, 2011
In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...Tim Wu From Communications of the ACM | May 1, 2011
Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.Brian Dorn From Communications of the ACM | May 1, 2011
Studying how privacy regulation might impact economic activity on the advertising-supported Internet.Avi Goldfarb, Catherine E. Tucker From Communications of the ACM | May 1, 2011
To compete with piracy, content providers need clear value propositions that don't conflict with the product.The Guardian From ACM Opinion | April 21, 2011