Research In Motion (RIM), makers of the venerable BlackBerry devices, will always be remembered as the company that liberated corporate email from the PC. In...Time From ACM Opinion | July 8, 2011
When the Walt Disney Company bought Pixar Animation Studios for $7.4 billion in 2006, there was understandable concern that the media conglomerate that drove...The New York Times From ACM Opinion | July 7, 2011
Viewing computer science in a broader context to dispel common misperceptions and provide more accurate guidance to students who are...Mordechai (Moti) Ben-Ari From Communications of the ACM | July 1, 2011
Addressing the challenges of increasing the number of women of color in computing and ensuring their success.Maria (Mia) Ong From Communications of the ACM | July 1, 2011
Reinstituting formalities — notice of copyright claims and registration requirements — could help address problems related to too many copyrights that last for...Pamela Samuelson From Communications of the ACM | July 1, 2011
Focusing on socio-technical design with values as a critical component in the design process.Cory Knobel, Geoffrey C. Bowker From Communications of the ACM | July 1, 2011
Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...Mari Sako From Communications of the ACM | July 1, 2011
Software developers should use empirical methods to analyze their designs to predict how working systems will behave.
Clayton T. Morrison, Richard T. Snodgrass From Communications of the ACM | June 1, 2011
Good software design is never easy, but stopping too soon makes the job more difficult.David Lorge Parnas From Communications of the ACM | June 1, 2011
One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...Phillip G. Armour From Communications of the ACM | June 1, 2011
Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.
Peter J. Denning, Dennis J. Frailey From Communications of the ACM | June 1, 2011
The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...Ari Schwartz From Communications of the ACM | June 1, 2011
A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...The New York Times From ACM Opinion | May 10, 2011
If there's one thing that's predictable in the technology world, it's that things change. Products that were commonplace 10 years ago (PDAs, CRT televisions,...MSNBC From ACM Opinion | May 10, 2011
Horse bettor John Astarita have plenty of explanations why horse racing revenue is on the decline. One complaint concerns deep-pocket investors who use computer...Las Vegas Sun From ACM Opinion | May 6, 2011
In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services...San Jose Mercury news From ACM News | May 6, 2011
Continuous integration and an automated asset pipeline should guarantee that you can produce an up-to-date working version of the game you are working on in very... #AltDevBlogADay From ACM Opinion | May 6, 2011