acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

What Apple's Ipad Means For Your Wallet


From ACM Opinion

Don't Become a Tool of Hegemony, Google!

President of People's Daily Online He Jiazheng speaks on Internet freedom: The Google-China dispute shows a strategic position change of the United States. In...

­.s. Enables Chinese Hacking of Google
From ACM Opinion

­.s. Enables Chinese Hacking of Google

Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such as Gmail, in a politically motivated attempt...

From ACM Opinion

Comment: Internet New Shot in the Arm For ­S Hegemony

Over the past 40 years, the US has been dominating the world Internet as the core technique holder with an inherent advantage of being the cradle of the Internet...

Open Access to Scientific Publications
From Communications of the ACM

Open Access to Scientific Publications

In his July 2009 Communications editor's letter "Open, Closed, or Clopen Access?", editor-in-chief Moshe Vardi addressed...

The Need For a National Cybersecurity R&D Agenda
From Communications of the ACM

The Need For a National Cybersecurity R&D Agenda

Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.

Why an Informatics Degree?
From Communications of the ACM

Why an Informatics Degree?

Isn't computer science enough?

Not Seeing the Crime For the Cameras?
From Communications of the ACM

Not Seeing the Crime For the Cameras?

Why it is difficult — but essential — to monitor the effectiveness of security technologies.

From ACM Opinion

Outsourcing Makes A Comeback

After fizzling out over the past couple years, outsourcing is back in vogue. A new PricewaterhouseCoopers study shows outsourcing has roared back to life in the...

The Evolution of Platform Thinking
From Communications of the ACM

The Evolution of Platform Thinking

How platform adoption can be an important determinant of product and technological success.

Five Questions For Francine Berman
From ACM Opinion

Five Questions For Francine Berman

The winner of the inaugural Ken Kennedy Award, Francine Berman answers questions about her career, the reasons for her success, and the most important lessons she's...

From ACM Opinion

Connecting with an Internet Pioneer, 40 Years Later

Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...

Computing's Paradigm
From Communications of the ACM

Computing's Paradigm

Trying to categorize computing as engineering, science, or math is fruitless; we have our own paradigm.

Israel's Technology Industry as an Economic Growth Engine
From Communications of the ACM

Israel's Technology Industry as an Economic Growth Engine

How government-industry collaboration can have far-reaching economic influences.

Opening Remarks
From Communications of the ACM

Opening Remarks

Highlighting efforts and providing the rationale to increase the participation and success of underrepresented groups in computing.

Revamping DARPA Is Vital to Preserving the ­.s. Lead in It
From ACM Opinion

Revamping DARPA Is Vital to Preserving the ­.s. Lead in It

Government-funded basic and applied research at U.S. universities has been one of the pillars of the U.S. high tech sector. But at least in information technology...

On Public Service and Computer Science
From Communications of the ACM

On Public Service and Computer Science

Members of the computer science community should become more involved in public service by becoming program managers at federal agencies, the opportunities and...

The Broadband Price Is Not Right
From Communications of the ACM

The Broadband Price Is Not Right

Developing an effective pricing index is essential to understanding the value of broadband connectivity.

Are Business Methods Patentable?
From Communications of the ACM

Are Business Methods Patentable?

How the U.S. Supreme Court's forthcoming decision in the Bilski v. Doll case is expected to affect existing and future software patents.

Usable Security: How to Get It
From Communications of the ACM

Usable Security: How to Get It

Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account