Introducing CMD-IT, a new center focused on synergistic activities related to ethnic minorities and people with disabilities.Valerie E. Taylor From Communications of the ACM | July 1, 2010
Considering the precedent that could be established by approval of the controversial Google book settlement.Pamela Samuelson From Communications of the ACM | July 1, 2010
Technological change results in changes in expectations, in this case affecting the workplace.Jason Borenstein From Communications of the ACM | July 1, 2010
Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.Mari Sako From Communications of the ACM | July 1, 2010
Extraordinary cases make bad law. In a sense, Armando Galarraga’s non-perfect perfect game, spoiled by an umpire’s call on what should have been the 27th out, offers...The New York Times From ACM Opinion | June 3, 2010
Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...Simson L. Garfinkel, Lorrie Faith Cranor From Communications of the ACM | June 1, 2010
Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...François Lévêque From Communications of the ACM | June 1, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
One of the great conundrums of war and technology is the odd fact that there is no such thing as a permanent first-mover advantage.Popular Mechanics From ACM Opinion | May 21, 2010
Telepathic helmets. Grid-computing swarms of cyborg insects, some for surveillance, some with lethal stingers. New cognitive-enhancement drugs. (What? AdderallProvigil...Slate From ACM Opinion | May 20, 2010
New research by the Electronic Frontier Foundation (EFF) has found that an overwhelming majority of web browsers have unique signatures--creating identifiable "fingerprints"...Electronic Frontier Foundation From ACM Opinion | May 19, 2010
All Americans--whether brown, white, or black--should be required to carry a passport showing they are red, white, and blue.Newsweek From ACM Opinion | May 14, 2010
Apple could soon be the target of an antitrust investigation by either the Federal Trade Commission or the Department of Justice, according to numerous press reports...Wired From ACM Opinion | May 6, 2010
Social networking companies don't have it easy. Advertisers covet their users' data, and in a niche that often seems to lack a clear business model, selling (or...The Electronic Frontier Foundation From ACM Opinion | May 3, 2010
The story could have been programmed to draw media coverage, were it not for its implausibility: Apple (a reader magnet) banned a future Pulitzer Prize winner's...The Washington Post From ACM Opinion | April 23, 2010
Tracy Mitrano, Cornell University's director of IT Policy says the recent U.S. Federal Appeals Court decision in Comcast v. FCC and the FCC's efforts to enforce...Cornell niversity From ACM Opinion | April 23, 2010
The second of a two-part series highlighting several of the world's museums dedicated to preserving, exhibiting, and elucidating computing history.William Aspray From Communications of the ACM | May 1, 2010
Studying the prevalence of mobile email addiction and the associated possible implications for organizations.Ofir Turel, Alexander Serenko From Communications of the ACM | May 1, 2010