acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Coming African Tsunami of Information Insecurity
From Communications of the ACM

The Coming African Tsunami of Information Insecurity

As the affordability and use of mobile phones in Africa increase, so too will security vulnerabilities.

From Communications of the ACM

In Support of Computer Science Teachers and the CSTA

If we want more computer science students, and if we want computer scientists to be understood for what we are, we must clarify the message about computer science...

Sensor Networks For the Sciences
From Communications of the ACM

Sensor Networks For the Sciences

Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.

Why Isn't Cyberspace More Secure?
From Communications of the ACM

Why Isn't Cyberspace More Secure?

Evaluating governmental actions—and inactions—toward improving cyber security and addressing future challenges.

Why Do Software Startups Patent (or Not)?
From Communications of the ACM

Why Do Software Startups Patent (or Not)?

Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.

K-12 Computational Learning
From Communications of the ACM

K-12 Computational Learning

Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.

The Divergent Online News Preferences of Journalists and Readers
From Communications of the ACM

The Divergent Online News Preferences of Journalists and Readers

Reading between the lines of the thematic gap between the supply and demand of online news.

Score: Agile Research Group Management
From Communications of the ACM

Score: Agile Research Group Management

Adapting agile software development methodology toward more efficient management of academic research groups.

Version Aversion
From Communications of the ACM

Version Aversion

The way you number your releases communicates more than you might think.

Platforms and Services: Understanding the Resurgence of Apple
From Communications of the ACM

Platforms and Services: Understanding the Resurgence of Apple

Combining new consumer devices and Internet platforms with online services and content is proving to be a successful strategy.

Victorian Data Processing
From Communications of the ACM

Victorian Data Processing

The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...

Why God Did Not Create the ­niverse
From ACM Opinion

Why God Did Not Create the ­niverse

There is a sound scientific explanation for the making of our world—no gods required.

Objects Never? Well, Hardly Ever!
From Communications of the ACM

Objects Never? Well, Hardly Ever!

Revisiting the Great Objects Debate.

Discussing Cyber Attack
From Communications of the ACM

Discussing Cyber Attack

Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.

Principles of the Law of Software Contracts
From Communications of the ACM

Principles of the Law of Software Contracts

An overview of a new set of legal principles for software contracts developed by the American Law Institute.

Return at Risk
From Communications of the ACM

Return at Risk

Calculating the likely true cost of projects.

Rights For Autonomous Artificial Agents?
From Communications of the ACM

Rights For Autonomous Artificial Agents?

The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.

Remembrances of Things Pest
From Communications of the ACM

Remembrances of Things Pest

Recalling malware milestones.

Presenting Your Project
From Communications of the ACM

Presenting Your Project

The what, the how, and the why of giving an effective presentation.

Has China Caught Up in IT?
From Communications of the ACM

Has China Caught Up in IT?

An assessment of the relative achievements in IT infrastructure, firms, and innovation in China.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account