February 2008 - Vol. 51 No. 2
Features
Opinion Editorial pointers
Alternate reality gaming (ARG) is a relatively new genre of collaborative entertainment that combines online information and puzzles with real-world events. Known for their elaborate scavenger hunts, ARGs attract players into interactive plots that often blur the distinction between cyberspace and public space; online cues lead players to real-world clues with the goal of finding […]
News News track
SciVee.com, funded by the National Science Foundation, is the latest in a growing number of video-sharing startups designed to let scientists broadcast themselves working in the lab or delivering lectures. The media outlet encourages scholars with new research papers to make short videos, or pubcasts, highlighting their key points. The Associated Press reports fans of […]
Opinion Forum
I strongly disagree with the implication in Steven M. Bellovin et al.’s "Inside Risks" column "Internal Surveillance, External Risks" (Dec. 2007) that because the U.S. is a transit point for so much transcontinental international Internet traffic, U.S. government agencies should be able to intercept international communications transiting the U.S. Internet infrastructure. They said that if […]
News SIG election candidates
SIGs Announce Candidates For Election
In accordance with ACM Bylaw 6, the following SIGs will hold elections in 2008: SIGCAS; SIGGRAPH; SIGSIM, and SIGUCCS. ACM Policy and Procedures require that those SIGs holding elections notify their membership of candidates for elected offices. Here is a list of SIGs that have submitted their slate of candidates. Additional information will appear in […]
Opinion Technology strategy and management
Managing Software Development in Globally Distributed Teams
Surveying the basic elements needed for globally distributed teams to function smoothly and efficiently.
Opinion Viewpoint
Peer to Patent Needs Your Expertise
You can help ensure that computer-related patents are properly reviewed and stop the worthless ones from being granted.
Opinion Legally speaking
How to Achieve (Some) Balance in Anti-Circumvention Laws
Should users of technically protected content be able to give notice and require content owners to take down the technical measure to enable fair uses?
News ACM annual report for FY07
In recent months we have celebrated ACM’s 60th Anniversary and the 50th Anniversary of its flagship publication, Communications of the ACM. Both events signify the enduring role ACM has played as the conduit for the world’s educators, researchers, and professionals to share their common computing interests, inspire new innovation, and reveal their latest research. Indeed, […]
Millions update the state of the game on the way to a common conclusion, in one case to help the Operator regain control of a spaceship and bring her crew back to the future.
IT Diffusion in Developing Countries
Policymakers need to recognize that developing economies have different drivers for IT investment than their wealthier brethren.
Are People Biased in Their Use of Search Engines?
Assessing user search behavior when deciding which links to follow in rank-ordered results lists.
Alternative Scenarios to the ‘Banner’ Years
A test of alternative formats to Web banner ads.
How managerial prompting, group identification, and social value orientation affect knowledge-sharing behavior.
The Myths and Truths of Wireless Security
Technology will never cure all wireless security ills. It will take a coordinated effort involving corporations, manufacturers, employers, and end users to fight the fight.
Municipal Broadband Wireless Networks
"...people lack many things: jobs, shelter, food, health care and drinkable water. Today, being cut off from basic telecommunications services is a hardship almost as acute as these other deprivations, and may indeed reduce the chances of finding remedies to them."---UN Secretary General, Kofi Annan, in a keynote address to the International Telecommunication Union, Oct. 9, 1999.
Women and Men in the IT Profession
Fewer women entering IT drives the underrepresentation problem.
Managing Large Collections of Data Mining Models
Data analysts and naive users alike in information-intensive organizations need automated ways to build, analyze, and maintain very large collections of data mining models.
Opinion Technical opinion
Record Matching in Digital Library Metadata
Using evidence from external sources to create more accurate matching systems.
Opinion Inside risks
Software Transparency and Purity
Many software programs contain unadvertised functions that upset users when they discover them. These functions are not bugs, but rather operations intended by their designers to be hidden from end users. The problem is not new—Trojan horses and Easter eggs were among the earliest instances—but it is increasingly common and a source of many risks. […]