Considering the precedent that could be established by approval of the controversial Google book settlement.Pamela Samuelson From Communications of the ACM | July 1, 2010
Technological change results in changes in expectations, in this case affecting the workplace.Jason Borenstein From Communications of the ACM | July 1, 2010
Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.Mari Sako From Communications of the ACM | July 1, 2010
If you’re reading this blog post on a computer, mobile phone or e-reader, please stop what you’re doing immediately. You could be making yourself stupid. And whatever...The New York Times From ACM Opinion | June 11, 2010
Amid the silly videos and spam are the roots of a new reading and writing culture, says Clay Shirky.The Wall Street Journal From ACM Opinion | June 9, 2010
Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...Simson L. Garfinkel, Lorrie Faith Cranor From Communications of the ACM | June 1, 2010
Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...François Lévêque From Communications of the ACM | June 1, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
In their continued quest to plumb the mysterious depths of human interactions, some sociologists have stopped watching people—and started watching their avatars...Ars Technica From ACM Opinion | May 10, 2010
Bruno Bachimont, scientific advisor of the Department of Research and Innovation at France's Institut National de l'Audiovisuel, discusses the constructive mix...Integrated Science Education From ACM Opinion | May 6, 2010
Imagine a school where a student could sketch out an idea for a new design of bicycle and not only draw it in 3D using a computer-aided design package but actually...BBC News From ACM Opinion | May 3, 2010
"How can global warming be real when there’s so much snow?" Hearing that question—repeatedly—this past February drove Joseph Romm nuts. A massive snowstorm had...Wired From ACM Opinion | April 27, 2010
The second of a two-part series highlighting several of the world's museums dedicated to preserving, exhibiting, and elucidating computing history.William Aspray From Communications of the ACM | May 1, 2010
Studying the prevalence of mobile email addiction and the associated possible implications for organizations.Ofir Turel, Alexander Serenko From Communications of the ACM | May 1, 2010
Improving the research base for computing education requires securing competitive funding commitments.Cameron Wilson, Mark Guzdial From Communications of the ACM | May 1, 2010
Assessing the strengths, weaknesses, and general applicability of the computing-as-utility business model.
Erik Brynjolfsson, Paul Hofmann, John Jordan From Communications of the ACM | May 1, 2010
Professional computing education for undergraduate majors and fundamental computer education for non-majors has evolved in China over the past decade as the nation...Technical Symposium on Computer Science Education From ACM Opinion | March 31, 2010
Incorporating the consideration of privacy into the ongoing debate concerning network neutrality.Paul Ohm From Communications of the ACM | April 1, 2010