To succeed on a global scale, businesses should focus on a trio of key elements.
Siew Kien Sia, Christina Soh, Peter Weill From Communications of the ACM | March 2010
An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo From Communications of the ACM | December 2009
Long considered an afterthought, software maintenance is easiest and most effective when built into a system from the ground up.Paul Stachour, David Collier-Brown From Communications of the ACM | November 2009
As the sophistication of wiretapping technology grows, so too do the risks it poses to our privacy and security.Whitfield Diffie, Susan Landau From Communications of the ACM | November 2009
To shield the browser from attacks, Google Chrome developers eyed three key problems.Charles Reis, Adam Barth, Carlos Pizano From Communications of the ACM | August 2009
New drive technologies and increased capacities create new categories of failure modes that will influence system designs.
Jon Elerath From Communications of the ACM | June 2009
Users with no security training download Web browsers from the Internet without precaution, and demand that they be fast and easy to use. What can be done to make ...Thomas Wadlow, Vlad Gorelik From Communications of the ACM | May 2009
Web-based malware attacks are more insidious than ever. What can be done to stem the tide?Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis From Communications of the ACM | April 2009
When it comes to virtualization platforms, experts say focus first on the services to be delivered.
Mache Creeger From Communications of the ACM | December 2008
How do we apply the concept of resource orientation by designing representations to support interactions?Erik Wilde, Robert J. Glushko From Communications of the ACM | October 2008
The answer to software reliability concerns may lie in formal methods.Mike Hinchey, Michael Jackson, Patrick Cousot, Byron Cook, Jonathan P. Bowen, Tiziana Margaria From Communications of the ACM | September 2008
Online games and virtual worlds have familiar scaling requirements, but don't be fooled: Everything you know is wrong.Jim Waldo From Communications of the ACM | August 2008