acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

Let Our Bots Do Our Tweeting For ­S

My tweets generally reflect a set of parochial interests I continually revisit: the shuffle function in iTunes, the Phillies’ crummy batting lineup, reviews of...

Arrogance in Business Planning
From Communications of the ACM

Arrogance in Business Planning

Technology business plans that assume no competition — ever.

Realizing the Value of Social Media Requires Innovative Computing Research
From Communications of the ACM

Realizing the Value of Social Media Requires Innovative Computing Research

How social media are expanding traditional research and development topics for computer and information scientists.

Managing Time, Part 2
From Communications of the ACM

Managing Time, Part 2

Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.

Corporate Social Responsibility and Global IT Outsourcing
From Communications of the ACM

Corporate Social Responsibility and Global IT Outsourcing

How to improve IT outsourcing relationships while doing good for society.

In Praise of 'Wilkes, Wheeler, and Gill'
From Communications of the ACM

In Praise of 'Wilkes, Wheeler, and Gill'

Sixty years ago, Maurice Wilkes, David Wheeler, and Stanley Gill produced the first textbook on programming: The Preparation of Programs for an Electronic Digital...

Remix Nation
From Communications of the ACM

Remix Nation

Assessing the threat the anticircumvention provisions of the Digital Millennium Copyright Act pose for fair use.

Steve, Please Buy ­S a Carrier!
From ACM Opinion

Steve, Please Buy ­S a Carrier!

What should Apple do with its $76bn in cash? It could do worse than spend some of it on acquiring its own mobile carrier.

Why Cctv Has Failed to Deter Criminals
From ACM Opinion

Why Cctv Has Failed to Deter Criminals

I've lost track of the number of people who've asked me to comment on David Cameron's insane plan to cripple Britain's Internet in times of civil unrest by blocking...

From ACM Opinion

What Constitutes an Act of Cyberwar?

Before we get to that, there's a clue in the spelling of the word: cyberwar instead of cyber war. The U.S. Defense Department has determined that cyber is a fifth...

11 Hard Truths About Html5
From ACM Opinion

11 Hard Truths About Html5

HTML5 heralds some nifty new features and the potential for sparking a Web programming paradigm shift, and as some members of the technical press have touted,...

From ACM Opinion

Education Needs a Digital-Age ­pgrade

If you have a child entering grade school this fall, file away just one number with all those back-to-school forms: 65 percent. Chances are just that good that...

Why I Already Miss Physical Media
From ACM Opinion

Why I Already Miss Physical Media

For years, I had a happy weekend ritual. I'd head to my local Tower Records and lose myself in the aisles of CDs and DVDs. After emerging from the store—usually...

From ACM News

Encrypt the Web with Https Everywhere

The Electronic Frontier Foundation, in collaboration with the Tor Project, has launched an official 1.0 version of HTTPS Everywhere, a tool for the Firefox Web...

From ACM Opinion

Google's Instant Pages and the Joys of a Computer that Can Read Your Mind

Chrome is reading my mind. When I type a search query in Google's Web browser, it offers me the most likely results right in the address bar. It doesn't justWikipedia...

From ACM News

Shady Rat Hacking Is Not About China

Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...

Why Cloud Computing Must Evolve
From ACM Opinion

Why Cloud Computing Must Evolve

The marked increase in the use of the Internet for accessing computing resources will necessitate an evolution in the cloud computing network.

How a Hashtag Changed My Philosophy on Life
From ACM Opinion

How a Hashtag Changed My Philosophy on Life

Twitter users have a way of self-identifying gratuitous complaints they make. They use the hashtag first-world problems. As in, "I can't believe Netflix is doubling...

From ACM News

Can We Make Machines Listen More Carefully?

You probably use voice recognition technology already, if in a limited capacity. Maybe you use Google's voice-activated search, or take advantage of its (somewhat...

From ACM News

Decoding Your Email Personality

Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account