From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
In an age where business dominates our governments and writes our laws, every technological advance offers business an opportunity to impose new restrictions...Richard Stallman From ACM Opinion | June 9, 2011
RSA Security is offering to provide security monitoring or replace its well-known SecurID tokens—devices used by millions of corporate workers to securely log...The Wall Street Journal From ACM News | June 7, 2011
When Jeff Moss, popularly known as the Dark Tangent, started holding underground hacker conferences in Las Vegas he knew he had a problem. All previous gatherings...The Guardian From ACM Opinion | June 6, 2011
Thanks to many people who have written in asking whether the recent Google announcement of a new China-based wave of attacks on Gmail accounts is related to the...The Atlantic From ACM Opinion | June 6, 2011
The reauthorization of the Patriot Act looks like a forgone conclusion. But next month, a bipartisan band of legislators will try to mitigate a different kind...Wired From ACM News | May 31, 2011
Many readers are probably too young too remember Senator William Proxmire. I am sorry to say he served in the U.S. Senate from 1957 to 1989. Despite some good...University of Michigan Press From ACM Opinion | May 27, 2011
In this era of Big Data, there is little that cannot be tracked in our online lives—or even in our offline lives. Consider one new Silicon Valley venture, called...Technology Review From ACM Opinion | May 26, 2011
Software developers should use empirical methods to analyze their designs to predict how working systems will behave.
Clayton T. Morrison, Richard T. Snodgrass From Communications of the ACM | June 1, 2011
Good software design is never easy, but stopping too soon makes the job more difficult.David Lorge Parnas From Communications of the ACM | June 1, 2011
One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...Phillip G. Armour From Communications of the ACM | June 1, 2011
Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.
Peter J. Denning, Dennis J. Frailey From Communications of the ACM | June 1, 2011
The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...Ari Schwartz From Communications of the ACM | June 1, 2011
Without library privacy, individuals might not engage in free and open inquiry for fear that their interactions with the library will be used against them.Harvard Law School From ACM Opinion | May 20, 2011
Google's executive chairman, Eric Schmidt, warned on Wednesday that government plans to block access to illicit filesharing websites could set a "disastrous precedent"...The Guardian From ACM News | May 19, 2011
One of the joys of the last few years has been the flood of real-world data sets being released by all sorts of organizations. These usually involve some record...O'Reilly Radar From ACM News | May 18, 2011
Android is open-source software, but it doesn't come with much of an open-source community, and the Google leader of the project explained why.CNET From ACM News | May 17, 2011
A year ago, Ralph Langner was plugging away in relative obscurity, doing security consulting work for the industrial control system industry in his Hamburg headquarters...CNET From ACM News | May 13, 2011
The best way to improve the U.S. economy fast is to poach entrepreneurs from the rest of the world. So why do we make it so difficult for them to immigrate?Slate From ACM Opinion | May 11, 2011
A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...The New York Times From ACM Opinion | May 10, 2011