Madison C. Allen Kuyenga, Eleanor R. Glover Gladney, Michael Lachney, Marwin McKnight, Theodore S. Ransaw, Dominick Sanders, Aman Yadav| October 1, 2023
If we want more computer science students, and if we want computer scientists to be understood for what we are, we must clarify the message about computer science...Duncan Buell From Communications of the ACM | November 1, 2010
Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.Matt Welsh From Communications of the ACM | November 1, 2010
Evaluating governmental actions—and inactions—toward improving cyber security and addressing future challenges.Joel F. Brenner From Communications of the ACM | November 1, 2010
Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.Pamela Samuelson From Communications of the ACM | November 1, 2010
Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.
Stephen Cooper, Lance C. Pérez, Daphne Rainey From Communications of the ACM | November 1, 2010
Patrick Gorman, former associate director of the U.S. Office of the Director of National Intelligence, says the United States should apply the lessons of the space...GovInfoSecurity.com From ACM TechNews | October 13, 2010
Larry and Sergey founded Google because they wanted to help solve really big problems using technology. And one of the big problems we’re working on today is...Google From ACM Opinion | October 13, 2010
"In the 1960s I think that in some sense the present was actually about three or four years long," he said, "because in three or four years relatively little...BBC News From ACM Opinion | October 12, 2010
Research suggests that the approach that worked with a few large companies with aligned interests needs revisiting in the Internet age.MIT News Office From ACM Opinion | October 8, 2010
Talking to a computer security researcher about Stuxnet is like asking an art critic to describe the finer points of the Mona Lisa. The world's top cybersecurity...Slate From ACM Opinion | October 6, 2010
The saga of Steven P. Jobs is so well known that it has entered the nation’s mythology: he’s the prodigal who returned to Apple in 1997, righted a listing ship...The New York Times From ACM Opinion | October 6, 2010
In an increasingly digital world, ironically, there may yet be a silver lining to the primitive nature of India's infrastructure: that it is not computer-controlled...Daily News and Analysis From ACM Opinion | October 5, 2010
Adapting agile software development methodology toward more efficient management of academic research groups.Michael Hicks, Jeffrey S. Foster From Communications of the ACM | October 1, 2010
The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...Martin Campbell-Kelly From Communications of the ACM | October 1, 2010
Any headline that uses the phrase "wiretap the Internet" is likely to make people on the Internet cranky. When this wiretapping scheme comes from an administration...The Washington Post From ACM Opinion | September 28, 2010
A study published Monday drew on a host of metrics to conclude something we all already knew: The media covers Apple more than any other company.Wired From ACM Opinion | September 28, 2010