Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.
Peter J. Denning, Dennis J. Frailey From Communications of the ACM | June 1, 2011
The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...Ari Schwartz From Communications of the ACM | June 1, 2011
Without library privacy, individuals might not engage in free and open inquiry for fear that their interactions with the library will be used against them.Harvard Law School From ACM Opinion | May 20, 2011
When you look back at the past 50 years of human spaceflight, don't forget the computer scientists who helped make it possible.MSNBC From ACM News | May 16, 2011
The best way to improve the U.S. economy fast is to poach entrepreneurs from the rest of the world. So why do we make it so difficult for them to immigrate?Slate From ACM Opinion | May 11, 2011
A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...The New York Times From ACM Opinion | May 10, 2011
If there's one thing that's predictable in the technology world, it's that things change. Products that were commonplace 10 years ago (PDAs, CRT televisions,...MSNBC From ACM Opinion | May 10, 2011
The Soviet Union's 1957 launch of Sputnik, the first man-made satellite to orbit Earth, had a profound impact on American higher education, and drove Andrew Romberger...Reading Eagle From ACM Opinion | May 10, 2011
As long as it took to find and kill Osama bin Laden after the terrorist attacks on New York and Washington, it has taken even longer to commemorate the thousands...The New Yorker From ACM Opinion | May 9, 2011
Some of the folks responsible for developing and promoting the technologies that have undermined the U.S. Postal Service are banding together in an attempt to save...The Washington Post From ACM Opinion | May 6, 2011
Reuse, recycle, repurpose, renewables. This past Earth Day, we heard a lot about these concepts. As important as they are, I've noticed one phrase missing from...San Jose Mercury News From ACM Opinion | May 6, 2011
It's time for a major change in the way our personal, private data is handled. We need to take back our data from companies that are unwilling and unable to protect...ZDNet From ACM Opinion | May 5, 2011
The decision to drop terror chieftain Osama bin Laden’s corpse into the Arabian Sea was the final meticulous step in a raid whose details were calculated to exert...Politico From ACM Opinion | May 2, 2011
No sooner had President Obama released his long-form birth certificate than Orly Taitz, the doyenne of the "birther" movement, found reason to doubt it.The New York Times From ACM Opinion | May 2, 2011
Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...The New York Times From ACM Opinion | April 25, 2011
Highlighting the significance of the often overlooked underlying software used to produce research results.Juan A. Añel From Communications of the ACM | May 1, 2011
In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...Tim Wu From Communications of the ACM | May 1, 2011
Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.Brian Dorn From Communications of the ACM | May 1, 2011
Studying how privacy regulation might impact economic activity on the advertising-supported Internet.Avi Goldfarb, Catherine E. Tucker From Communications of the ACM | May 1, 2011