acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Is Mobile Email Addiction Overlooked?
From Communications of the ACM

Is Mobile Email Addiction Overlooked?

Studying the prevalence of mobile email addiction and the associated possible implications for organizations.

Can IT Lean Against the Wind?
From Communications of the ACM

Can IT Lean Against the Wind?

Lessons from the global financial crisis.

How to Make Progress in Computing Education
From Communications of the ACM

How to Make Progress in Computing Education

Improving the research base for computing education requires securing competitive funding commitments.

Cloud Computing and Electricity: Beyond the Utility Model
From Communications of the ACM

Cloud Computing and Electricity: Beyond the Utility Model

Assessing the strengths, weaknesses, and general applicability of the computing-as-utility business model.

A Less Personal Computer
From ACM Opinion

A Less Personal Computer

In Web parlance, "chrome" is the part of the browser that surrounds the page: the address bar, the "Back" button, and those all-important bookmarks. Chrome is also...

The 50 Most Innovative Companies 2010
From ACM Opinion

The 50 Most Innovative Companies 2010

Once U.S. companies dominated Business Week's Most Innovative Companies ranking, outnumbering corporations outside of America. But for the first time ever, more...

So, How Real Are Robots?
From ACM Opinion

So, How Real Are Robots?

Robots can do all kinds of tasks, from folding clothes to fighting wars. But a professor says we should consider the ethics of unleashing robots.

From ACM Opinion

Eff Backs Yahoo! to Protect ­ser from Warrantless Email Search

The Electronic Frontier Foundation (EFF) along with Google and numerous other public interest organizations and Internet industry associations joined with Yahoo...

I Was Hacked in Beijing
From ACM Opinion

I Was Hacked in Beijing

The reality--and my fears--dawned only slowly. For weeks, friends and colleagues complained I had not answered their e-mail messages. I swore I had not received...

How Science Became Cool
From ACM Opinion

How Science Became Cool

The incredible ambition of the Large Hadron Collider has fired our imagination; physicists have become cult TV stars; dramatic new pictures from space grace a million...

Rethinking a Gospel of the Web
From ACM Opinion

Rethinking a Gospel of the Web

For about a decade now, ever since it became clear that the jungle of the World Wide Web would triumph over the walled gardens of CompuServe, AOL and MSN, a general...

The Idiocy of Text-Message Adultery
From ACM Opinion

The Idiocy of Text-Message Adultery

"How did you fool so many people for so long?" a reporter asked Tiger Woods at his press conference Monday. Woods replied: "I fooled myself." And how. Woods was...

North Korea Needs to Set ­p Practical It Training and Certification Systems
From ACM Opinion

North Korea Needs to Set ­p Practical It Training and Certification Systems

The promotion of the IT industry in North Korea can be done in a way that could minimize the extent of market opening.

From ACM Opinion

­ndergraduate Computer Science Education in China

Professional computing education for undergraduate majors and fundamental computer education for non-majors has evolved in China over the past decade as the nation...

From ACM Opinion

Not Creating Content. Just Protecting It.

Should we be surprised that the biggest fight over freedom of expression in years involves Google, a company that produces algorithms rather than articles? Probably...

When Network Neutrality Met Privacy
From Communications of the ACM

When Network Neutrality Met Privacy

Incorporating the consideration of privacy into the ongoing debate concerning network neutrality.

Cloud Computing and SaaS as New Computing Platforms
From Communications of the ACM

Cloud Computing and SaaS as New Computing Platforms

To become an industry platform, vendors must open their infrastructure technology to other product companies.

Be Careful What You Wish For
From Communications of the ACM

Be Careful What You Wish For

Reflections on the decline of mathematical tables.

Development 2.0: The IT-Enabled Transformation of International Development
From Communications of the ACM

Development 2.0: The IT-Enabled Transformation of International Development

The fundamental assumptions of international development are changing, increasingly putting the tools for a digital economy into the hands of the world's poor. ...

From ACM Opinion

Google Is Definitely No "god"

Google announced at 3:00 a.m. Tuesday, March 23rd (Beijing Time) its decision to move most of its China-based search functions from the Chinese mainland to Hong...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account