The recent denial-of-service attacks in Estonia reprise a running theme in this column space: the prevalence of inherent weaknesses regarding security, survivability, and…
Peter G. Neumann
Networking problems offer many potential lessons that must be assimilated by researchers, developers, and operators of highly distributed systems such as computer…
In hindsight, the lack of foresight is an old problem that keeps recurring. The most prevalent situation seems to be "we had a backup system, but it failed when it…
Risks Relating to System Compositions
The challenge of developing systems with complex sets of requirements seems to be inherently complicated, despite persistent advice to keep it simple. However, consider…
Like most other technologies, RFID (Radio-Frequency IDentification) systems have pluses and minuses. In their most common applications, passive RFID tags enable rapid…
System trustworthiness is in essence a logical basis for confidence that a system will predictably satisfy its critical requirements, including information security,…
People with disabilities often experience difficulties that arise from their interactions with computer technology, above and beyond the usual risks. Their job…
ACM – Association for Computing Machinery Advanced Search Browse About Sign in Register Advanced Search Journals Magazines Proceedings Books SIGs Conferences People…
Responsibilities of Technologists
Around the world, our lives are increasingly dependent on technology. What should be the responsibilities of technologists regarding technological and nontechnological…
Technology today plays a greater role in elections than at any other point in the history of democracy. The Florida 2000 experience served to accelerate an existing trend…
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved