Madison C. Allen Kuyenga, Eleanor R. Glover Gladney, Michael Lachney, Marwin McKnight, Theodore S. Ransaw, Dominick Sanders, Aman Yadav| October 1, 2023
Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...CNET From ACM News | June 15, 2011
In an age where business dominates our governments and writes our laws, every technological advance offers business an opportunity to impose new restrictions...Richard Stallman From ACM Opinion | June 9, 2011
Vint Cerf, one of the Internet's original inventors, notes in an interview that although industry awards are important, they do not receive enough visibility. Network World From ACM TechNews | June 7, 2011
RSA Security is offering to provide security monitoring or replace its well-known SecurID tokens—devices used by millions of corporate workers to securely log...The Wall Street Journal From ACM News | June 7, 2011
When Jeff Moss, popularly known as the Dark Tangent, started holding underground hacker conferences in Las Vegas he knew he had a problem. All previous gatherings...The Guardian From ACM Opinion | June 6, 2011
Thanks to many people who have written in asking whether the recent Google announcement of a new China-based wave of attacks on Gmail accounts is related to the...The Atlantic From ACM Opinion | June 6, 2011
Dr. Regina Dugan is director of the Defense Advance Research Projects Agency, where she researches, develops, and demonstrates high-risk, high-payoff projects...AllThingsD From ACM News | June 2, 2011
Many readers are probably too young too remember Senator William Proxmire. I am sorry to say he served in the U.S. Senate from 1957 to 1989. Despite some good...University of Michigan Press From ACM Opinion | May 27, 2011
The promotion of science and math degrees is hampered by the impression that only the smartest of the smart can obtain them. What can educators do to make STEM's...National Journal From ACM Opinion | May 27, 2011
Once upon a time, the story goes, we lived in a broadcast society. In that dusty pre-Internet age, the tools for sharing information weren’t widely available....The New York Times From ACM Opinion | May 26, 2011
Software developers should use empirical methods to analyze their designs to predict how working systems will behave.
Clayton T. Morrison, Richard T. Snodgrass From Communications of the ACM | June 1, 2011
Good software design is never easy, but stopping too soon makes the job more difficult.David Lorge Parnas From Communications of the ACM | June 1, 2011
One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...Phillip G. Armour From Communications of the ACM | June 1, 2011
Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.
Peter J. Denning, Dennis J. Frailey From Communications of the ACM | June 1, 2011
The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...Ari Schwartz From Communications of the ACM | June 1, 2011
Limor Fried discusses the future of the open source hardware movement, Facebook’s decision to open source its new data center, and being featured on the cover of...Leah Hoffmann From ACM News | May 25, 2011
Advances in computer modeling and other technologies still cannot overcome the fundamental complexity of thunderstorm and subsequent tornado formation.Scientific American From ACM News | May 24, 2011