acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Sensor Networks For the Sciences
From Communications of the ACM

Sensor Networks For the Sciences

Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.

K-12 Computational Learning
From Communications of the ACM

K-12 Computational Learning

Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.

The Divergent Online News Preferences of Journalists and Readers
From Communications of the ACM

The Divergent Online News Preferences of Journalists and Readers

Reading between the lines of the thematic gap between the supply and demand of online news.

Version Aversion
From Communications of the ACM

Version Aversion

The way you number your releases communicates more than you might think.

Platforms and Services: Understanding the Resurgence of Apple
From Communications of the ACM

Platforms and Services: Understanding the Resurgence of Apple

Combining new consumer devices and Internet platforms with online services and content is proving to be a successful strategy.

Victorian Data Processing
From Communications of the ACM

Victorian Data Processing

The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...

Future Internet Architecture: Clean-Slate Versus Evolutionary Research
From Communications of the ACM

Future Internet Architecture: Clean-Slate Versus Evolutionary Research

Should researchers focus on designing new network architectures or improving the current Internet?

Data Mining Is Shaping Our World. Are We Ready For It?
From ACM Opinion

Data Mining Is Shaping Our World. Are We Ready For It?

Each day we exchange a mess of content through Facebook, Twitter, blogs, discussion boards and other online forums. How are companies and other organizations using...

Technology Lessons from the Wikileaks Saga
From ACM Opinion

Technology Lessons from the Wikileaks Saga

There's already debate about whether Wikileaks's release of 92,000 classified documents on the war in Afghanistan was more of a milestone in the annals of national...

Remembrances of Things Pest
From Communications of the ACM

Remembrances of Things Pest

Recalling malware milestones.

Preparing Computer Science Students For the Robotics Revolution
From Communications of the ACM

Preparing Computer Science Students For the Robotics Revolution

Robotics will inspire dramatic changes in the CS curriculum.

Is the Internet a Maturing Market?
From Communications of the ACM

Is the Internet a Maturing Market?

Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband...

From ACM TechNews

Enlist It Tools

Throwing more teams of specialists at intelligence gaps that allowed terror suspects to slip through the net will not solve the problem, write Rensselaer Polytechnic...

Is Computer Science Truly Scientific?
From Communications of the ACM

Is Computer Science Truly Scientific?

Reflections on the (experimental) scientific method in computer science.

Outsourcing Versus Shared Services
From Communications of the ACM

Outsourcing Versus Shared Services

Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.

Plotting Away
From Communications of the ACM

Plotting Away

Dear KV, I've been working with some code that generates massive data sets, and . . . I'm finding that more and more often I...

From ACM TechNews

Info Systems Must 'connect the Dots' on Terrorism

Additional personnel alone cannot address the lapses in the U.S. intelligence community, which also needs state-of-the-art information technologies that enhance...

How to Make Progress in Computing Education
From Communications of the ACM

How to Make Progress in Computing Education

Improving the research base for computing education requires securing competitive funding commitments.

Cloud Computing and Electricity: Beyond the Utility Model
From Communications of the ACM

Cloud Computing and Electricity: Beyond the Utility Model

Assessing the strengths, weaknesses, and general applicability of the computing-as-utility business model.

The Idiocy of Text-Message Adultery
From ACM Opinion

The Idiocy of Text-Message Adultery

"How did you fool so many people for so long?" a reporter asked Tiger Woods at his press conference Monday. Woods replied: "I fooled myself." And how. Woods was...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account