How gaming, as the first media market to successfully transition toward media-as-a-service, is an exemplar for a similar evolutionary transition of content and...Tim Chang From Communications of the ACM | March 1, 2010
A report in The Washington Post on the Congressional investigation of the National Highway Traffic Safety Administration's response to multiple reports of Toyota...TheCarConnection.com From ACM Opinion | February 23, 2010
Despite the cancellation of NASA's back-to-the-moon program, the next steps on the moon will likely be taken sometime in the next decade under human control. It's...MSNBC From ACM Opinion | February 17, 2010
When Toyota Prius owners take their cars to the dealer under the company's latest recall, they'll likely be out of the shop in about 30 minutes. Even though the...Slate From ACM Opinion | February 16, 2010
There was no lack of, well, buzz about Google's new Buzz social-media platform last week, but more important were a series of moves that suggest the search giant...Time From ACM Opinion | February 16, 2010
I like to think of myself as the Dick Cheney of the Browser Wars—an unyielding proponent of greater and greater hostilities between the developers working on Chrome...Slate From ACM Opinion | February 8, 2010
The more, the better. That’s the fashionable recipe for nurturing new ideas these days. It emphasizes a kind of Internet-era egalitarianism that celebrates the...The New York Times From ACM Opinion | February 1, 2010
Over the past 40 years, the US has been dominating the world Internet as the core technique holder with an inherent advantage of being the cradle of the Internet...China Daily From ACM Opinion | January 26, 2010
Michael O. Rabin, co-recipient of the 1976 ACM A.M. Turing Award, discusses his innovative algorithmic work with Dennis Shasha.Dennis Shasha, Michael Rabin From Communications of the ACM | February 1, 2010
Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.
Douglas Maughan From Communications of the ACM | February 1, 2010
In a position paper for community input at NSF's Future of High Performance Computing Workshop in early December, Calit2 Director Larry Smarr reviewed the successes...CALIT2 From ACM Opinion | December 30, 2009
Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important...Butler Lampson From Communications of the ACM | November 1, 2009
Jamie Zawinski is what I would call a duct-tape programmer.
I say that with a great deal of respect. He is the kind of programmer who is hard at work building...joelonsoftware.com From ACM Opinion | September 25, 2009