From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.Pamela Samuelson From Communications of the ACM | November 1, 2010
Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.
Stephen Cooper, Lance C. Pérez, Daphne Rainey From Communications of the ACM | November 1, 2010
Research suggests that the approach that worked with a few large companies with aligned interests needs revisiting in the Internet age.MIT News Office From ACM Opinion | October 8, 2010
Adapting agile software development methodology toward more efficient management of academic research groups.Michael Hicks, Jeffrey S. Foster From Communications of the ACM | October 1, 2010
The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...Martin Campbell-Kelly From Communications of the ACM | October 1, 2010
The Valley used to be a place run by scientists and engineers, people like Robert Noyce, the Ph.D. physicist who helped invent the integrated circuit and cofounded...Newsweek From ACM Opinion | September 24, 2010
A "hacker" is a technologist with a love for computing and a "hack" is a clever technical solution arrived through a non-obvious means. It doesn't mean to compromise...The Atlantic From ACM Opinion | September 23, 2010
In February 2008, a pair of suicide bombers struck the Israeli town of Dimona. One of the attackers detonated his explosive vest, killing an Israeli, and injuring...The Atlantic From ACM Opinion | September 13, 2010
Have the activists behind WikiLeaks—and in particular the Web site's founder, Julian Assange—become intoxicated by their own myth? Two recent events involving...Newsweek From ACM Opinion | August 30, 2010
Silicon Valley has passed an important milestone that may mark the end of one era and the beginning of another.San Jose Mercury News From ACM Opinion | August 26, 2010
Right now, more than 100 foreign intelligence organizations are trying to hack into the digital networks that undergird U.S. military operations. The Pentagon...Foreign Affairs From ACM Opinion | August 25, 2010
Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.Peter J. Denning, Dorothy E. Denning From Communications of the ACM | September 1, 2010
An overview of a new set of legal principles for software contracts developed by the American Law Institute.Robert A. Hillman, Maureen A. O'Rourke From Communications of the ACM | September 1, 2010
There's been quite a bit of head-scratching over Intel's decision to purchase McAfee, but, despite all the breathless talk about mobile security and ARM and virus...Ars Technica From ACM Opinion | August 23, 2010
Who has the right to decide what information should be kept secret? That's the vexatious question raised by WikiLeaks and its founder Julian Assange, who masterminded...New Scientist From ACM Opinion | August 16, 2010