Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.
Douglas Maughan From Communications of the ACM | February 1, 2010
This one seems to be the best handled racist accusation on any Tech company. HP's face recognition technology seems to fail in tracking Black faces as comparedView...Katonda News Network From ACM Opinion | December 23, 2009
Design education is as important to the future of the economy as the sciences, technology, mathematics and engineering, and should be given equal support.The Guardian From ACM Opinion | December 15, 2009
Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...Scientific American From ACM Opinion | December 8, 2009
Computers scientists are poised to play a key role in the development of nanotechnology, writes British Computer Society member professor Alan Oxley. Computer...Computing From ACM TechNews | December 7, 2009
Once primarily a place for outsourcing call centers and repetitive software development, Bangalore is now home to a thriving research and development (R&D) industry...silicon.com From ACM TechNews | December 2, 2009
Donald Knuth is an extraordinary man. As well as inventing 'Literate Programming' and writing The Art of Computer Programming—often cited as the most important...Simple-Talk From ACM Opinion | December 1, 2009
Government-funded basic and applied research at U.S. universities has been one of the pillars of the U.S. high tech sector. But at least in information technology...Harvard Business Publishing From ACM Opinion | November 4, 2009
Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important...Butler Lampson From Communications of the ACM | November 1, 2009
The U.S. Department of Homeland Security should be doing more to recruit top cyber security talent and develop a highly skilled workforce of cyber security workers...Federal Times From ACM CareerNews | September 14, 2009
Jamie Zawinski is what I would call a duct-tape programmer.
I say that with a great deal of respect. He is the kind of programmer who is hard at work building...joelonsoftware.com From ACM Opinion | September 25, 2009
Should computers be intuitive, requiring little to no learning or thinking? Is it even possible for them to be so?
“Nothing is intuitive,” said Slashdot blogger...LinuxInsider From ACM Opinion | September 25, 2009
The venture capital industry, like financial services in general, has fallen on hard times. Part of the problem is that large payoffs...Michael Cusumano From Communications of the ACM | October 1, 2009
Conficker's alarming growth rate in early 2009 along with the apparent mystery surrounding its ultimate purpose had raised concern among...Phillip Porras From Communications of the ACM | October 1, 2009