acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Rights For Autonomous Artificial Agents?
From Communications of the ACM

Rights For Autonomous Artificial Agents?

The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.

Remembrances of Things Pest
From Communications of the ACM

Remembrances of Things Pest

Recalling malware milestones.

Presenting Your Project
From Communications of the ACM

Presenting Your Project

The what, the how, and the why of giving an effective presentation.

How Html5 Will Shake ­p the Web
From ACM Opinion

How Html5 Will Shake ­p the Web

HTML5, the next version of the markup language used to build Web pages, has attracted attention for its ability to show video inside a Web browser without using...

A to Z of Programming Languages: Smalltalk-80
From ACM TechNews

A to Z of Programming Languages: Smalltalk-80

Much of modern-day programming is based on the Smalltalk-80 programming language, which was co-developed by Alan Kay, widely considered the father of the concept...

Outsourcing Versus Shared Services
From Communications of the ACM

Outsourcing Versus Shared Services

Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.

Software Studies, Rethinking Computing For Development in Africa
From ACM Opinion

Software Studies, Rethinking Computing For Development in Africa

The field of computer science builds on Western industry, military and government interests. Modern day computing has almost wholly emerged out of a western context...

Plotting Away
From Communications of the ACM

Plotting Away

Dear KV, I've been working with some code that generates massive data sets, and . . . I'm finding that more and more often I...

Myths and Fallacies of 'Personally Identifiable Information'
From Communications of the ACM

Myths and Fallacies of 'Personally Identifiable Information'

Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...

From ACM TechNews

Html: Still Not All It's Cracked ­p to Be

The headaches of Web application development are being compounded by the ever-proliferating morass of Web standards, frameworks, and tools.

From ACM Opinion

Apple: The Microsoft of Mobile?

Apple could soon be the target of an antitrust investigation by either the Federal Trade Commission or the Department of Justice, according to numerous press reports...

From ACM Opinion

Rest in Peas: The ­nrecognized Death of Speech Recognition

The accuracy of computer speech recognition flat-lined in 2001, before reaching human levels. The funding plug was pulled, but no funeral, no text-to-speech eulogy...

From ACM Opinion

Steve Jobs' Thoughts on Flash

Apple has a long relationship with Adobe. In fact, we met Adobe’s founders when they were in their proverbial garage. Apple was their first big customer, adopting...

Cloud Computing and Electricity: Beyond the Utility Model
From Communications of the ACM

Cloud Computing and Electricity: Beyond the Utility Model

Assessing the strengths, weaknesses, and general applicability of the computing-as-utility business model.

Marc Maiffret: The Quick Rise of a Teen Hacker
From ACM Opinion

Marc Maiffret: The Quick Rise of a Teen Hacker

For Marc Maiffret, the turning point in his life came when—at the age of 17—he woke up to an FBI agent pointing a gun at his head. A runaway and high school dropout...

From ACM Opinion

Get Prepared For the Html5 Revolution

HTML5 promises to revolutionize the way you build Web sites. Check out what fantastic new features are in store in the forthcoming Web standard.

The Data-Structure Canon
From Communications of the ACM

The Data-Structure Canon

Data structures are part of the foundation of computer science. It pays to revisit them from time to time.

Cloud Computing and SaaS as New Computing Platforms
From Communications of the ACM

Cloud Computing and SaaS as New Computing Platforms

To become an industry platform, vendors must open their infrastructure technology to other product companies.

Be Careful What You Wish For
From Communications of the ACM

Be Careful What You Wish For

Reflections on the decline of mathematical tables.

A Tale of 20 Interns, One Project and One Fiery Debate
From ACM Opinion

A Tale of 20 Interns, One Project and One Fiery Debate

Few geeks are unfamiliar with the concept of the "Mythical Man-Month" from Fred Brooks' classic software engineering tome by the same name. It's a classic for good...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account