From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.Mari Sako From Communications of the ACM | July 1, 2010
James Plummer, dean of Stanford University's school of engineering, envisions an expansion of the electronics industry's purview from information technology to...EE Times From ACM TechNews | June 21, 2010
The launch of Microsoft's new Kinect games system, which allows players to run, jump, punch and shoot without having to wear strange clothing or hold any kind of...The Guardian From ACM Opinion | June 18, 2010
Do you hear that? The hideous, piercing dirge of a B-flat drone that is the unfortunate backdrop to every single World Cup match? It’s the vuvuzela, a stupid plastic...Wired From ACM Opinion | June 17, 2010
The National Security Agency wants job applicants to know that its polygraph test is nothing to sweat. The eavesdropping and code-breaking organization has produced...The Washington Post From ACM Opinion | June 15, 2010
The field of computer science builds on Western industry, military and government interests. Modern day computing has almost wholly emerged out of a western context...ICT4Entrepreneurship From ACM Opinion | June 14, 2010
If you’re reading this blog post on a computer, mobile phone or e-reader, please stop what you’re doing immediately. You could be making yourself stupid. And whatever...The New York Times From ACM Opinion | June 11, 2010
Amid the silly videos and spam are the roots of a new reading and writing culture, says Clay Shirky.The Wall Street Journal From ACM Opinion | June 9, 2010
Google's Vint Cerf says the Internet needs better security across all of its levels, and says that common ground must be found concerning what constitutes Internet...EE Times From ACM TechNews | June 3, 2010
The Obama administration's progress toward the goal of making the U.S. digital infrastructure "secure, trustworthy, and resilient" has been sluggish due to the...The Washington Post From ACM TechNews | June 3, 2010
Extraordinary cases make bad law. In a sense, Armando Galarraga’s non-perfect perfect game, spoiled by an umpire’s call on what should have been the 27th out, offers...The New York Times From ACM Opinion | June 3, 2010
We did not create life from scratch: we transformed existing life into new life. Nor did we design and build a new chromosome from scratch. Rather, using only digitised...New Scientist From ACM Opinion | May 27, 2010
Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...Simson L. Garfinkel, Lorrie Faith Cranor From Communications of the ACM | June 1, 2010
Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...François Lévêque From Communications of the ACM | June 1, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
Six years ago, we built Facebook around a few simple ideas. People want to share and stay connected with their friends and the people around them. If we give people...The Washington Post From ACM Opinion | May 26, 2010
The Web is a teeming commercial city. It's haphazardly planned. Its public spaces are mobbed, and signs of urban decay abound in broken links and abandoned projects...The New York Times From ACM Opinion | May 24, 2010