Advertisement

Deriving Mutual Benefits From Offshore Outsourcing

The concept of outsourcing has been addressed from different vantage points by various researchers. Many researchers have examined the impact of outsourcing on employment. Wiederhold et al14 looked at intellectual property and tax implications when a software company operates in multiple countries. This article takes an entirely different perspective. What are new computer-based techniques that […]

The Challenge of Epistemic Divergence In IS Development

The organizational environment increasingly demands that computer-based information systems are responsive to change and can work with each other seamlessly (ideally from a dynamic perspective). Given the large investment that organizations have in mission-critical legacy systems, evolutionary maintenance and systems integration now form a very significant part of the cost and effort profile of systems […]

Forensics of Computers and Handheld Devices

It is 8:45 in the morning. You are stuck in bumper-to-bumper traffic and will be unforgivably late for a crucial conference call. You decide to call in on your mobile phone. Then you realise that you have left your phone and personal digital assistant (PDA) at home … and you start to sweat… This scenario […]

Re-Tuning the Music Industry: Can They Re-Attain Business Resonance?

For more than 50 years, the music industry has dealt with market-shifting technological change. The 1950s marked the end of the 78-rpm shellac disks. In 1951, Columbia began to release records on RCA’s 7-inch 45-rpm format. By 1954, record companies were using this format to deliver new songs to radio stations. In 1958, RCA introduced […]

A Holistic Framework For Knowledge Discovery and Management

The increased interest in knowledge discovery, knowledge management, and knowledge transfer can be attributed to many factors including the advances in information and communication technologies; data explosion and information overload; the expected significant loss in the workforce as the baby boomers retire; and, the need for organizations to better utilize their intellectual capital to stay […]

Leveraging First-Mover Advantages in Internet-Based Consumer Services

One of the most enduring strategic management concepts is first-mover advantage. The face validity of first mover advantage is highly compelling with a great deal of anecdotal evidence often cited in the popular business press. The means by which first mover success is established are enormously intuitive: high levels of brand identification by being the […]

Lest We Remember: Cold-Boot Attacks on Encryption Keys

DRAM retains its contents for several seconds after power is lost. Although DRAM becomes less reliable when it is not refreshed, it is not immediately erased, and its contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images.

Scalable Synchronous Queues

In a thread-safe concurrent queue, consumers typically wait for producers to make data available. In a synchronous queue, producers similarly wait for consumers to take the data. We present two new nonblocking, contention-free synchronous queues that achieve high performance through a form of dualism: The underlying data structure may hold both data and, symmetrically, requests.

Software Developers’ Views of End-Users and Project Success

For many years software development has been plagued by systems that, if they are completed at all, are limited in functionality, and are delivered over-budget and late.3 It has been suggested that an on-going “culture gap” is behind many of the problems associated with such systems,7,10 and that “poor communication” between end-users and developers has […]

Designing Ubiquitous Computing Environments to Support Work Life Balance

Information technology is no longer restricted to organizational use but is as common place in the home as electricity and water. Because of this increased ubiquity, work activities infiltrate the home with ease and spontaneity and employees can carry out family activities at work effortlessly. For the employee, this has lead to "the always-connected lifestyle." However, concerns have been raised as to the possible adverse effects on work life balance.

An Overview of IT Service Management

The July 2006 issue of the Communications2 was dedicated to the topic of Services Science, a new approach to viewing, developing, and deploying Information and Communication Technologies (ICT). The introduction, written by Jim Spohrer and Doug Riecken, both of IBM Corporation, stated: “To the majority of computer scientists, whether in academia or industry, the term […]

To Trust or to Distrust, That Is the Question: Investigating the Trust-Distrust Paradox

One major obstacle to the widespread diffusion of e-commerce is consumer distrust. In the highly uncertain virtual environment, people have a more prevalent tendency to distrust than to trust, so as to avoid potentially negative consequences. Although mechanisms to promote trust have been extensively researched, it is not clear whether these recommended trust-building mechanisms would be equally effective in reducing distrust.

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More