acm-header
Sign In

Communications of the ACM

Table of Contents


DEPARTMENT: Editorial pointers

Editorial Pointers


DEPARTMENT: News track

News Track


DEPARTMENT: Forum

Forum


DEPARTMENT: Hot links

Top 10 Downloads from ACM's Digital Library


COLUMN: The business of software

Counting Boulders and Measuring Mountains

Accuracy and the measurement of peaks and projects.

ACM Annual Report For FY05


COLUMN: Staying connected

The Network of Life

Service providers must work together to ensure a fail-safe communication system.
COLUMN: President's letter

New Directions For CACM?

Much has changed since the 1980s when the current format of Communications of the ACM was cast. What should be the mission of ACM's flagship publication in the 21st century?
COLUMN: Viewpoint

How to Think About Security Failures

Understanding complexity and feedback in security models highlights the need for better failure modes in solutions.
SPECIAL ISSUE: Personal information management

Introduction

Cheap and fast search and storage technologies help bring order to our messy personal information environments, freeing us to make the most of our information collections.

Digital Memories in an Era of Ubiquitous Computing and Abundant Storage

A lifetime of digital memories is possible but raises many social, as well as technological, questions.

Personal Health Information Management

Integrating personal health information helps people manage their lives and actively participate in their own health care.

-sable Privacy and Security For Personal Information Management

The goal is a policy workbench enabling users to create and transform natural language policies into machine-readable code for enforcement and compliance audits.

Searching to Eliminate Personal Information Management

Search systems can alleviate the need to organize personal information by helping us find it no matter where we encountered it, what we remember about it, and even if we forget it exists.

Keeping Encountered Information

Utility, serendipity, and the pleasure of encountering what we save relies on more than search alone when using PIM tools.

Email in Personal Information Management

Email's conduit function means the inbox, folders, search, and sort are used to support core PIM functions of task management, personal archiving, and contact management.

From PIM to GIM: Personal Information Management in Group Contexts

Sharing personal information with networked groups and institutions raises questions about privacy and control best addressed through a new field of inquiry: group information management.

Data Unification in Personal Information Management

Users need ways to unify, simplify, and consolidate information too often fragmented by location, device, and software application.

Evaluating Personal Information Management Behaviors and Tools

How to study and understand the idiosyncratic PIM behaviors we exhibit naturally at home, at work, and in between, in the interests of developing future PIM tools.

MyLifeBits: A Personal Database For Everything

Developing a platform for recording, storing, and accessing a personal lifetime archive.

Four Dynamics For Bringing use Back Into Software Reuse

Reuse is such a powerful tool---so why isn't it more popular?

Insight and Perspectives For Content Delivery Networks

Striking a balance between the costs for Web content providers and the quality of service for Web customers.

Neo-Tribes: The Power and Potential of Online Communities in Health Care

Online communities deserve better than their current treatment---where they are largely relegated to the fringes of health care.

Seven Key Interventions For Data Warehouse Success

The success of data warehouses depends on the interaction of technology and social context. We present new insights into the implementation process and interventions that can lead to success.

Budgeting Process For Information Security Expenditures

Empirical evidence shows that cost-benefit analysis is a sound basis for budgeting information security expenditures.

Ethnocomputing: ICT in Cultural and Social Context

Although culture has recently been recognized as one factor in interface design, CS and engineering are generally thought to be culturally neutral. The approach presented here recognizes society and culture in computational concepts …
COLUMN: Technical opinion

The First 10 Years of the ECCC Digital Library

Developing a balance between author control and traditional scientific publication practices in a global digital library.
COLUMN: Inside risks

Software and Higher Education