From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
Reinstituting formalities — notice of copyright claims and registration requirements — could help address problems related to too many copyrights that last for...Pamela Samuelson From Communications of the ACM | July 1, 2011
Focusing on socio-technical design with values as a critical component in the design process.Cory Knobel, Geoffrey C. Bowker From Communications of the ACM | July 1, 2011
Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...Mari Sako From Communications of the ACM | July 1, 2011
In justifying U.S. involvement in Libya, the Obama administration cited the "responsibility to protect" citizens of other countries when their governments engage...The Wall Street Journal From ACM Opinion | June 20, 2011
Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...Symantec From ACM News | June 17, 2011
Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...CNET From ACM News | June 15, 2011
Online piracy is a huge business. A recent study found that Web sites offering pirated digital content or counterfeit goods, like illicit movie downloads or bootleg...The New York Times From ACM Opinion | June 10, 2011
In an age where business dominates our governments and writes our laws, every technological advance offers business an opportunity to impose new restrictions...Richard Stallman From ACM Opinion | June 9, 2011
RSA Security is offering to provide security monitoring or replace its well-known SecurID tokens—devices used by millions of corporate workers to securely log...The Wall Street Journal From ACM News | June 7, 2011
When Jeff Moss, popularly known as the Dark Tangent, started holding underground hacker conferences in Las Vegas he knew he had a problem. All previous gatherings...The Guardian From ACM Opinion | June 6, 2011
Thanks to many people who have written in asking whether the recent Google announcement of a new China-based wave of attacks on Gmail accounts is related to the...The Atlantic From ACM Opinion | June 6, 2011
Major corporations have made serious mistakes with information security recently, resulting in spectacular failures to protect business and customer records....Technology Review From ACM News | June 3, 2011
In this era of Big Data, there is little that cannot be tracked in our online lives—or even in our offline lives. Consider one new Silicon Valley venture, called...Technology Review From ACM Opinion | May 26, 2011
Software developers should use empirical methods to analyze their designs to predict how working systems will behave.
Clayton T. Morrison, Richard T. Snodgrass From Communications of the ACM | June 1, 2011
Good software design is never easy, but stopping too soon makes the job more difficult.David Lorge Parnas From Communications of the ACM | June 1, 2011
One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...Phillip G. Armour From Communications of the ACM | June 1, 2011
Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.
Peter J. Denning, Dennis J. Frailey From Communications of the ACM | June 1, 2011