From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.Pamela Samuelson From Communications of the ACM | November 1, 2010
Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.
Stephen Cooper, Lance C. Pérez, Daphne Rainey From Communications of the ACM | November 1, 2010
Patrick Gorman, former associate director of the U.S. Office of the Director of National Intelligence, says the United States should apply the lessons of the space...GovInfoSecurity.com From ACM TechNews | October 13, 2010
Talking to a computer security researcher about Stuxnet is like asking an art critic to describe the finer points of the Mona Lisa. The world's top cybersecurity...Slate From ACM Opinion | October 6, 2010
In an increasingly digital world, ironically, there may yet be a silver lining to the primitive nature of India's infrastructure: that it is not computer-controlled...Daily News and Analysis From ACM Opinion | October 5, 2010
Adapting agile software development methodology toward more efficient management of academic research groups.Michael Hicks, Jeffrey S. Foster From Communications of the ACM | October 1, 2010
An illustration of the problems caused by a lack of discipline in software development and our failure to apply what is known in the field.
David L. Parnas From Communications of the ACM | October 1, 2010
The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...Martin Campbell-Kelly From Communications of the ACM | October 1, 2010
Any headline that uses the phrase "wiretap the Internet" is likely to make people on the Internet cranky. When this wiretapping scheme comes from an administration...The Washington Post From ACM Opinion | September 28, 2010
A "hacker" is a technologist with a love for computing and a "hack" is a clever technical solution arrived through a non-obvious means. It doesn't mean to compromise...The Atlantic From ACM Opinion | September 23, 2010
Everyone and his Big Brother wants to log your browsing habits, the better to build a profile of who you are and how you live your life—online and off. Search...Time From ACM Opinion | September 14, 2010
Have the activists behind WikiLeaks—and in particular the Web site's founder, Julian Assange—become intoxicated by their own myth? Two recent events involving...Newsweek From ACM Opinion | August 30, 2010
Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This...Time From ACM Opinion | August 27, 2010
Right now, more than 100 foreign intelligence organizations are trying to hack into the digital networks that undergird U.S. military operations. The Pentagon...Foreign Affairs From ACM Opinion | August 25, 2010
Should researchers focus on designing new network architectures or improving the current Internet?Jennifer Rexford, Constantine Dovrolis From Communications of the ACM | September 1, 2010
Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.Peter J. Denning, Dorothy E. Denning From Communications of the ACM | September 1, 2010
An overview of a new set of legal principles for software contracts developed by the American Law Institute.Robert A. Hillman, Maureen A. O'Rourke From Communications of the ACM | September 1, 2010