acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Day the Internet Threw a Righteous Hissyfit About Copyright And Pie
From ACM Opinion

The Day the Internet Threw a Righteous Hissyfit About Copyright And Pie

So you might have heard a story yesterday about a little magazine called Cooks Source. Up until then, you might never have heard of Cooks Source. But maybe you've...

Google Is Polluting the Internet
From ACM Opinion

Google Is Polluting the Internet

The danger of allowing an advertising company to control the index of human knowledge is too obvious to ignore.

From ACM Opinion

Declare War on Wikileaks

The Pentagon looks defenseless against cyberwarfare.

From Communications of the ACM

In Support of Computer Science Teachers and the CSTA

If we want more computer science students, and if we want computer scientists to be understood for what we are, we must clarify the message about computer science...

Sensor Networks For the Sciences
From Communications of the ACM

Sensor Networks For the Sciences

Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.

Why Isn't Cyberspace More Secure?
From Communications of the ACM

Why Isn't Cyberspace More Secure?

Evaluating governmental actions—and inactions—toward improving cyber security and addressing future challenges.

Why Do Software Startups Patent (or Not)?
From Communications of the ACM

Why Do Software Startups Patent (or Not)?

Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.

K-12 Computational Learning
From Communications of the ACM

K-12 Computational Learning

Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.

­efa President Platini Opposed to Goal-Line Technology
From ACM Opinion

­efa President Platini Opposed to Goal-Line Technology

Uefa president Michel Platini believes goal-line technology would lead to "Playstation football."

From ACM Opinion

Why Telecom Regulation Needs to Change

Research suggests that the approach that worked with a few large companies with aligned interests needs revisiting in the Internet age.

Score: Agile Research Group Management
From Communications of the ACM

Score: Agile Research Group Management

Adapting agile software development methodology toward more efficient management of academic research groups.

Version Aversion
From Communications of the ACM

Version Aversion

The way you number your releases communicates more than you might think.

Victorian Data Processing
From Communications of the ACM

Victorian Data Processing

The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...

Friends Without Benefits
From ACM Opinion

Friends Without Benefits

The Valley used to be a place run by scientists and engineers, people like Robert Noyce, the Ph.D. physicist who helped invent the integrated circuit and cofounded...

From ACM Opinion

The Anthropology of Hackers

A "hacker" is a technologist with a love for computing and a "hack" is a clever technical solution arrived through a non-obvious means. It doesn't mean to compromise...

From ACM Opinion

Robots vs. Suicide Terrorists

In February 2008, a pair of suicide bombers struck the Israeli town of Dimona. One of the attackers detonated his explosive vest, killing an Israeli, and injuring...

Ban Drone-Porn War Crimes
From ACM Opinion

Ban Drone-Porn War Crimes

Death by joystick is immoral and illegal.

Is Wikileaks Too Full of Itself?
From ACM Opinion

Is Wikileaks Too Full of Itself?

Have the activists behind WikiLeaks—and in particular the Web site's founder, Julian Assange—become intoxicated by their own myth? Two recent events involving...

From ACM Opinion

Grim Numbers Point to the End of the Venture Capital Era

Silicon Valley has passed an important milestone that may mark the end of one era and the beginning of another.

From ACM Opinion

Defending a New Domain: The Pentagon

Right now, more than 100 foreign intelligence organizations are trying to hack into the digital networks that undergird U.S. military operations. The Pentagon...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account