February 2008 - Vol. 51 No. 2
Features
Opinion Editorial pointers
Alternate reality gaming (ARG) is a relatively new genre of collaborative entertainment that combines online information and puzzles with real-world events. Known for…
News News track
SciVee.com, funded by the National Science Foundation, is the latest in a growing number of video-sharing startups designed to let scientists broadcast themselves working…
News SIG election candidates
SIGs Announce Candidates For Election
In accordance with ACM Bylaw 6, the following SIGs will hold elections in 2008: SIGCAS; SIGGRAPH; SIGSIM, and SIGUCCS. ACM Policy and Procedures require that those SIGs…
Opinion Technology strategy and management
Managing Software Development in Globally Distributed Teams
Surveying the basic elements needed for globally distributed teams to function smoothly and efficiently.
Opinion Viewpoint
Peer to Patent Needs Your Expertise
You can help ensure that computer-related patents are properly reviewed and stop the worthless ones from being granted.
Opinion Legally speaking
How to Achieve (Some) Balance in Anti-Circumvention Laws
Should users of technically protected content be able to give notice and require content owners to take down the technical measure to enable fair uses?
News ACM annual report for FY07
In recent months we have celebrated ACM’s 60th Anniversary and the 50th Anniversary of its flagship publication, Communications of the ACM. Both events signify the…
Millions update the state of the game on the way to a common conclusion, in one case to help the Operator regain control of a spaceship and bring her crew back to the…
IT Diffusion in Developing Countries
Policymakers need to recognize that developing economies have different drivers for IT investment than their wealthier brethren.
Are People Biased in Their Use of Search Engines?
Assessing user search behavior when deciding which links to follow in rank-ordered results lists.
Alternative Scenarios to the ‘Banner’ Years
A test of alternative formats to Web banner ads.
How managerial prompting, group identification, and social value orientation affect knowledge-sharing behavior.
The Myths and Truths of Wireless Security
Technology will never cure all wireless security ills. It will take a coordinated effort involving corporations, manufacturers, employers, and end users to fight the…
Municipal Broadband Wireless Networks
"...people lack many things: jobs, shelter, food, health care and drinkable water. Today, being cut off from basic telecommunications services is a hardship almost as…
Women and Men in the IT Profession
Fewer women entering IT drives the underrepresentation problem.
Managing Large Collections of Data Mining Models
Data analysts and naive users alike in information-intensive organizations need automated ways to build, analyze, and maintain very large collections of data mining…
Opinion Technical opinion
Record Matching in Digital Library Metadata
Using evidence from external sources to create more accurate matching systems.
Opinion Inside risks
Software Transparency and Purity
Many software programs contain unadvertised functions that upset users when they discover them. These functions are not bugs, but rather operations intended by their…