acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Think Before You Fork
From Communications of the ACM

Think Before You Fork

Kode Vicious's thoughts on forking, config files, and using internal wikis.

The Risks of Stopping Too Soon
From Communications of the ACM

The Risks of Stopping Too Soon

Good software design is never easy, but stopping too soon makes the job more difficult.

Practical Application of Theoretical Estimation
From Communications of the ACM

Practical Application of Theoretical Estimation

One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...

Who Are We - Now?
From Communications of the ACM

Who Are We - Now?

Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.

One on One: Jaron Lanier
From ACM Opinion

One on One: Jaron Lanier

Jaron Lanier, a partner architect at Microsoft Research, has had a long and varied career in technology. Mr. Lanier popularized the term "virtual reality" in...

From ACM News

Why You Can't Really Anonymize Your Data

One of the joys of the last few years has been the flood of real-world data sets being released by all sorts of organizations. These usually involve some record...

How Computers Got US Into Space
From ACM News

How Computers Got US Into Space

When you look back at the past 50 years of human spaceflight, don't forget the computer scientists who helped make it possible.

There's No Data Sheriff on the Wild Web
From ACM Opinion

There's No Data Sheriff on the Wild Web

A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...

From ACM Opinion

The Names

As long as it took to find and kill Osama bin Laden after the terrorist attacks on New York and Washington, it has taken even longer to commemorate the thousands...

Customers Had More Faith in Sony Than It Deserved
From ACM News

Customers Had More Faith in Sony Than It Deserved

In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services...

Sorry But the Game Does Not Build Anymore
From ACM Opinion

Sorry But the Game Does Not Build Anymore

Continuous integration and an automated asset pipeline should guarantee that you can produce an up-to-date working version of the game you are working on in very...

Data Privacy, Put to the Test
From ACM News

Data Privacy, Put to the Test

To the catalog of corporate "bigs" that worry a lot of us little people, add this: Big Data.

From ACM Opinion

Will Amazon's Recent Server Failures Slow the Rise of Cloud Computing?

Last Thursday morning around 5 a.m. eastern time, Amazon suffered a major data center outage. These sorts of outages happen now and then, but they seldom makewhy...

From ACM Opinion

Iran's Answer to Stuxnet

Might a "halal Internet" be in the wings?

Your Iphone Is Tracking You. So What.
From ACM Opinion

Your Iphone Is Tracking You. So What.

Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...

Electronic Health Records Face Human Hurdles More Than Technological Ones
From ACM News

Electronic Health Records Face Human Hurdles More Than Technological Ones

In medicine, there's the patient and there's the chart. And the chart is paper.

The Importance of Reviewing the Code
From Communications of the ACM

The Importance of Reviewing the Code

Highlighting the significance of the often overlooked underlying software used to produce research results.

Online Advertising, Behavioral Targeting, and Privacy
From Communications of the ACM

Online Advertising, Behavioral Targeting, and Privacy

Studying how privacy regulation might impact economic activity on the advertising-supported Internet.

Are You Following a Bot?
From ACM Opinion

Are You Following a Bot?

How to manipulate social movements by hacking Twitter.

Got an Iphone or 3g Ipad? Apple Is Recording Your Moves
From ACM Opinion

Got an Iphone or 3g Ipad? Apple Is Recording Your Moves

A hidden file in iOS 4 is regularly recording the position of devices.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account