Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
The second of a two-part series highlighting several of the world's museums dedicated to preserving, exhibiting, and elucidating computing history.William Aspray From Communications of the ACM | May 1, 2010
Once U.S. companies dominated Business Week's Most Innovative Companies ranking, outnumbering corporations outside of America. But for the first time ever, more...Business Week From ACM Opinion | April 19, 2010
The fundamental assumptions of international development are changing, increasingly putting the tools for a digital economy into the hands of the world's poor.
...Richard Heeks From Communications of the ACM | April 1, 2010
Few geeks are unfamiliar with the concept of the "Mythical Man-Month" from Fred Brooks' classic software engineering tome by the same name. It's a classic for good...LinuxInsider From ACM Opinion | March 22, 2010
Those in Silicon Valley looking to have a bigger impact on the policymaking machinery of Washington, D.C., should take a close look at the genesis of the legislation...San Jose Mercury News From ACM Opinion | March 12, 2010
Seeking funding for current and future computing initiatives requires both a strong argument and a broad community of supporters.Cameron Wilson, Peter Harsha From Communications of the ACM | March 1, 2010
Emphasizing the importance of creating more programs and investing more funding toward the goal of developing minority faculty at research universities.
Richard Tapia From Communications of the ACM | March 1, 2010