"In the 1960s I think that in some sense the present was actually about three or four years long," he said, "because in three or four years relatively little...BBC News From ACM Opinion | October 12, 2010
Research suggests that the approach that worked with a few large companies with aligned interests needs revisiting in the Internet age.MIT News Office From ACM Opinion | October 8, 2010
Talking to a computer security researcher about Stuxnet is like asking an art critic to describe the finer points of the Mona Lisa. The world's top cybersecurity...Slate From ACM Opinion | October 6, 2010
Adapting agile software development methodology toward more efficient management of academic research groups.Michael Hicks, Jeffrey S. Foster From Communications of the ACM | October 1, 2010
Combining new consumer devices and Internet platforms with online services and content is proving to be a successful strategy.
Michael A. Cusumano From Communications of the ACM | October 1, 2010
The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...Martin Campbell-Kelly From Communications of the ACM | October 1, 2010
Any headline that uses the phrase "wiretap the Internet" is likely to make people on the Internet cranky. When this wiretapping scheme comes from an administration...The Washington Post From ACM Opinion | September 28, 2010
I am constantly impressed by the crazy amount of energy entrepreneurs spend hatching innovative services, so I have never understood why they seem to spend so...San Jose Mercury News From ACM Opinion | September 16, 2010
It may not be obvious, but if you’ve checked the weather today, ridden in a car or an airplane, made a phone call, or used any number of consumer products, down...The Wall Street Journal From ACM Opinion | September 10, 2010
"I actually think most people don't want Google to answer their questions," said the search giant's chief executive, Eric Schmidt, in a recent and controversial...The New York Times From ACM Opinion | September 2, 2010
It's deadly. It's irresponsible. And we've all done it. Before you commute home think about this: Why isn't there a better solution to texting while driving.Gizmodo From ACM Opinion | August 27, 2010
Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This...Time From ACM Opinion | August 27, 2010
Right now, more than 100 foreign intelligence organizations are trying to hack into the digital networks that undergird U.S. military operations. The Pentagon...Foreign Affairs From ACM Opinion | August 25, 2010
Should researchers focus on designing new network architectures or improving the current Internet?Jennifer Rexford, Constantine Dovrolis From Communications of the ACM | September 1, 2010
Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.Peter J. Denning, Dorothy E. Denning From Communications of the ACM | September 1, 2010