acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Tech in the Post-Pandemic World
From ACM Opinion

Tech in the Post-Pandemic World

Assessing its future, both the bad and the good.

Google Has A Plan To 'Fix' Online Privacy. Everybody Hates It
From ACM Opinion

Google Has A Plan To 'Fix' Online Privacy. Everybody Hates It

Google recently decided to adopt a new way to track users, and says it's more private than cookies and nearly as effective for advertising. The rest of the Internet...

The Healing Power of Javascript
From ACM Opinion

The Healing Power of Javascript

For some, code is therapy, an escape and a path to hope in a troubled world.

Building a Multilingual Wikipedia
From Communications of the ACM

Building a Multilingual Wikipedia

Seeking to develop a multilingual Wikipedia where content can be shared among language editions.

Roots of 'Program' Revisited
From Communications of the ACM

Roots of 'Program' Revisited

Considering the fundamental nature and malleability of programming.

When Hackers Were Heroes
From Communications of the ACM

When Hackers Were Heroes

The complex legacy of Steven Levy's obsessive programmers.

The Non-Psychopath's Guide to Managing an Open Source Project
From Communications of the ACM

The Non-Psychopath's Guide to Managing an Open Source Project

Respect your staff, learn from others, and know when to let go.

Why Was SolarWinds So Vulnerable to a Hack?
From ACM Opinion

Why Was SolarWinds So Vulnerable to a Hack?

The federal government should set minimum security standards for software and software development.

What Can the Maker Movement Teach Us About the Digitization of Creativity?
From Communications of the ACM

What Can the Maker Movement Teach Us About the Digitization of Creativity?

Experimenting with the creative process.

50 Years of Pascal
From Communications of the ACM

50 Years of Pascal

The Pascal programming language creator Niklaus Wirth reflects on its origin, spread, and further development.

Science Is Not Another Opinion
From Communications of the ACM

Science Is Not Another Opinion

The issue is not who has the "truth," but whose claims deserve more credence.

What To Do About Deepfakes
From Communications of the ACM

What To Do About Deepfakes

Seeking to reap the positive uses of synthetic media while minimizing or preventing negative societal impact.

Informing California Privacy Regulations with Evidence from Research
From Communications of the ACM

Informing California Privacy Regulations with Evidence from Research

Designing and testing 'Do Not Sell My Personal Information' icons.

Let's Not Dumb Down the History of Computer Science
From Communications of the ACM

Let's Not Dumb Down the History of Computer Science

Donald Knuth on the best way to recognize the history of computer science.

Kabin Fever
From Communications of the ACM

Kabin Fever

KV's guidelines for KFH (koding from home).

When Permissioned Blockchains Deliver More Decentralization Than Permissionless
From Communications of the ACM

When Permissioned Blockchains Deliver More Decentralization Than Permissionless

Considerations for the governance of distributed systems.

Go Language at 13 Years: Ecosystem, Evolution, and Future in Conversation with Steve Francia
From ACM Opinion

Go Language at 13 Years: Ecosystem, Evolution, and Future in Conversation with Steve Francia

To understand where Go is coming from and where it is going, InfoQ reached out to Steve Francia, a core member of the Go programming language team at Google responsible...

Insights for AI from the Human Mind
From Communications of the ACM

Insights for AI from the Human Mind

How the cognitive sciences can inform the quest to build systems with the flexibility of the human mind.

The Immortal Soul of an Old Machine
From Communications of the ACM

The Immortal Soul of an Old Machine

Taking apart a book to figure out how it works.

Cybersecurity Research for the Future
From Communications of the ACM

Cybersecurity Research for the Future

Considering the wide range of technological and societal trade-offs associated with cybersecurity.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account