From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
An assessment of the relative achievements in IT infrastructure, firms, and innovation in China.
Ping Gao, Jiang Yu From Communications of the ACM | August 1, 2010
Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband...Christopher S. Yoo From Communications of the ACM | August 1, 2010
Two horrendous calls at the World Cup show the need for technology—but don't tell the 'slippery slopers'
The Wall Street Journal From ACM Opinion | June 28, 2010
ACM's Distinguished Member Recognition Program recognizes members in three categories: Educator, Engineer, and Scientist. Each category...Marc Snir, Telle Whitney From Communications of the ACM | July 1, 2010
Introducing CMD-IT, a new center focused on synergistic activities related to ethnic minorities and people with disabilities.Valerie E. Taylor From Communications of the ACM | July 1, 2010
Considering the precedent that could be established by approval of the controversial Google book settlement.Pamela Samuelson From Communications of the ACM | July 1, 2010
Technological change results in changes in expectations, in this case affecting the workplace.Jason Borenstein From Communications of the ACM | July 1, 2010
Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.Mari Sako From Communications of the ACM | July 1, 2010
If you’re reading this blog post on a computer, mobile phone or e-reader, please stop what you’re doing immediately. You could be making yourself stupid. And whatever...The New York Times From ACM Opinion | June 11, 2010
ACM Fellow and A.M. Turing Award recipient Edward A. Feigenbaum, a pioneer in the field of expert systems, reflects on his career.Len Shustek From Communications of the ACM | June 1, 2010
Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...Simson L. Garfinkel, Lorrie Faith Cranor From Communications of the ACM | June 1, 2010
Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...François Lévêque From Communications of the ACM | June 1, 2010
Dear KV, I've been working with some code that generates massive data sets, and . . . I'm finding that more and more often I...George V. Neville-Neil From Communications of the ACM | June 1, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
In their continued quest to plumb the mysterious depths of human interactions, some sociologists have stopped watching people—and started watching their avatars...Ars Technica From ACM Opinion | May 10, 2010