acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Victorian Data Processing
From Communications of the ACM

Victorian Data Processing

The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...

Future Internet Architecture: Clean-Slate Versus Evolutionary Research
From Communications of the ACM

Future Internet Architecture: Clean-Slate Versus Evolutionary Research

Should researchers focus on designing new network architectures or improving the current Internet?

Objects Never? Well, Hardly Ever!
From Communications of the ACM

Objects Never? Well, Hardly Ever!

Revisiting the Great Objects Debate.

Principles of the Law of Software Contracts
From Communications of the ACM

Principles of the Law of Software Contracts

An overview of a new set of legal principles for software contracts developed by the American Law Institute.

Return at Risk
From Communications of the ACM

Return at Risk

Calculating the likely true cost of projects.

Rights For Autonomous Artificial Agents?
From Communications of the ACM

Rights For Autonomous Artificial Agents?

The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.

Remembrances of Things Pest
From Communications of the ACM

Remembrances of Things Pest

Recalling malware milestones.

Presenting Your Project
From Communications of the ACM

Presenting Your Project

The what, the how, and the why of giving an effective presentation.

Preparing Computer Science Students For the Robotics Revolution
From Communications of the ACM

Preparing Computer Science Students For the Robotics Revolution

Robotics will inspire dramatic changes in the CS curriculum.

Is the Internet a Maturing Market?
From Communications of the ACM

Is the Internet a Maturing Market?

Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband...

From ACM Opinion

Killed By Code: Software Transparency in Implantable Medical Devices

Software is an integral component of a range of devices that perform critical, lifesaving functions and basic daily tasks. As patients grow more reliant on computerized...

How Often Does Your Phone Drop Calls?
From ACM Opinion

How Often Does Your Phone Drop Calls?

Apple, Research in Motion, and the rest of the cell phone industry don't want you to know.

How Html5 Will Shake ­p the Web
From ACM Opinion

How Html5 Will Shake ­p the Web

HTML5, the next version of the markup language used to build Web pages, has attracted attention for its ability to show video inside a Web browser without using...

Lithium: Why It Makes Such Great Batteries
From ACM Opinion

Lithium: Why It Makes Such Great Batteries

One theme I ran into over and over while writing about the periodic table was the future of energy and the question of which element or elements will replace carbon...

Is Computer Science Truly Scientific?
From Communications of the ACM

Is Computer Science Truly Scientific?

Reflections on the (experimental) scientific method in computer science.

Work Life in the Robotic Age
From Communications of the ACM

Work Life in the Robotic Age

Technological change results in changes in expectations, in this case affecting the workplace.

Outsourcing Versus Shared Services
From Communications of the ACM

Outsourcing Versus Shared Services

Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.

Plotting Away
From Communications of the ACM

Plotting Away

Dear KV, I've been working with some code that generates massive data sets, and . . . I'm finding that more and more often I...

The Resurgence of Parallelism
From Communications of the ACM

The Resurgence of Parallelism

Parallel computation is making a comeback after a quarter century of neglect. Past research can be put to quick use today.

Myths and Fallacies of 'Personally Identifiable Information'
From Communications of the ACM

Myths and Fallacies of 'Personally Identifiable Information'

Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account