acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Managing Time, Part 2
From Communications of the ACM

Managing Time, Part 2

Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.

Corporate Social Responsibility and Global IT Outsourcing
From Communications of the ACM

Corporate Social Responsibility and Global IT Outsourcing

How to improve IT outsourcing relationships while doing good for society.

From ACM Opinion

Can Math Beat Financial Markets?

Wall Street's wild swings last week helped skew both retirement portfolios and mathematical models of the financial markets. After all, a standard Gaussian function—a...

From ACM Opinion

What Constitutes an Act of Cyberwar?

Before we get to that, there's a clue in the spelling of the word: cyberwar instead of cyber war. The U.S. Defense Department has determined that cyber is a fifth...

From ACM News

The Death of Booting ­p

Remember "booting up"? It was the first thing you did every morning—you waited two minutes, three minutes, sometimes even longer while your computer ran through...

Apple's Rise to Top Means Less Than You Think
From ACM Opinion

Apple's Rise to Top Means Less Than You Think

With Apple officially becoming the world's most valuable company—at least for a day—it's tempting to engage in lofty talk about what this says about the rise...

From ACM News

Google's Self-Driving Wreck: Really Human Error?

When a self-driving car crashes, one just has to wonder about those robots. Are they really all they're cracked up to be? Or might they be just as cracked as...

From ACM Opinion

Google's Instant Pages and the Joys of a Computer that Can Read Your Mind

Chrome is reading my mind. When I type a search query in Google's Web browser, it offers me the most likely results right in the address bar. It doesn't justWikipedia...

From ACM News

Shady Rat Hacking Is Not About China

Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...

From Gamification to Intelligence Amplification to The Singularity
From ACM Opinion

From Gamification to Intelligence Amplification to The Singularity

I've been thinking about the combination of artificial intelligence and intelligence amplification and specifically the symbiosis of these two things. And the...

From ACM News

The Auteur vs. the Committee

At Apple, one is the magic number.

Bob Young on Collaboration, Innovation, and Standing on the Shoulders of Giants
From ACM Opinion

Bob Young on Collaboration, Innovation, and Standing on the Shoulders of Giants

Bob Young knows about open source and innovation. He's co-founder and former CEO of Red Hat. Founder and CEO of Lulu. Here are the lessons he's learned from open...

From ACM News

Can We Make Machines Listen More Carefully?

You probably use voice recognition technology already, if in a limited capacity. Maybe you use Google's voice-activated search, or take advantage of its (somewhat...

'i Fear the Net Will Soon Become a War Zone'
From ACM Opinion

'i Fear the Net Will Soon Become a War Zone'

Evgeny Kaspersky is one of Russia's top Internet virus hunters. In an interview, he discusses a raft of recent hacker attacks on multinationals, the "total professionals"...

From ACM News

Decoding Your Email Personality

Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...

Why Twitter Should Double Its Character Limit
From ACM Opinion

Why Twitter Should Double Its Character Limit

Five years ago this month, Twitter opened itself up to the public. The new service, initially called Twttr, was born out of software engineer Jack Dorsey's fascination...

From ACM Opinion

The Internet of Things (infographic)

When we think of being connected to the Internet, our minds immediately shift to our computers, phones, and most recently tablets. This week at Cisco live, I...

From ACM Opinion

Leadership of Cyber Warriors

Leadership is a core competency of the officers, warrant officers, and non-commissioned officers across the military services. A principle tenant of leadership...

Storage Strife
From Communications of the ACM

Storage Strife

Beware keeping data in binary format.

Geography Is Alive and Well in Virtual Teams
From Communications of the ACM

Geography Is Alive and Well in Virtual Teams

Just because a team is virtual, it doesn't mean geography is dead.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account