acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

How Are We Doing?
From Communications of the ACM

How Are We Doing?

A rabbinical story tells about an angry reader who stormed into a newspaper office waving the day's paper, asking to see the editor of the obituary column.

Kode Vicious: Permanence and Change
From Communications of the ACM

Kode Vicious: Permanence and Change

Highlighting the importance of doing one's best in view of code longevity and the impermanence of the changineer.

Emerging Markets: Labor Supply in the Indian IT Industry
From Communications of the ACM

Emerging Markets: Labor Supply in the Indian IT Industry

Exploring the evolving dynamics and interconnectedness of India's educational system and its IT work force.

CTO Virtualization Roundtable
From Communications of the ACM

CTO Virtualization Roundtable: Part II

When it comes to virtualization platforms, experts say focus first on the services to be delivered.

Advising Policymakers Is More Than Just Providing Advice
From Communications of the ACM

Advising Policymakers Is More Than Just Providing Advice

What are the factors that make certain advisory committee reports successful while others are not?

Time to Take Evolutionary Development Off the Shelf
From Communications of the ACM

Time to Take Evolutionary Development Off the Shelf

Large systems projects are failing at an alarming rate. It's time to take evolutionary design methods off the shelf.

Education: Reprogramming College Preparatory Computer Science
From Communications of the ACM

Education: Reprogramming College Preparatory Computer Science

The college preparatory computer science education curriculum must be improved, beginning with the earliest phases of the process.

Legally Speaking: <i>Quanta</i>fying the Value of Patent Exhaustion
From Communications of the ACM

Legally Speaking: Quantafying the Value of Patent Exhaustion

Should patents confer power to restrict reuses and redistributions of products embodying the whole or essential parts of inventions?

Cyber Privacy and Security Pose Difficult Problems
From Communications of the ACM

Cyber Privacy and Security Pose Difficult Problems

It's not just science or engineering that will be needed to address security concerns, but law, economics, anthropology, and more.

CTO Roundtable on Virtualization
From Communications of the ACM

CTO Roundtable on Virtualization: Part I

Virtualization technology is hot again, but for the right reasons?

Point/Counterpoint: The U.S. Should Ban Paperless Electronic Voting Machines
From Communications of the ACM

Point/Counterpoint: The U.S. Should Ban Paperless Electronic Voting Machines

Debating the public policy issues involved in proposed efforts toward improving voting systems while considering the range of technical and societal challenges....

Historical Reflections: Will the Future of Software Be Open Source?
From Communications of the ACM

Historical Reflections: Will the Future of Software Be Open Source?

Tracing the course of influential computing developments and considering possible paths to new paradigms.

From the Front Lines: DOA with SOA
From Communications of the ACM

From the Front Lines: DOA with SOA

Diagnosing the symptoms of failing to accommodate critical software architecture properties that often result in the demise of projects.

Computer Experts: Guns-For-Hire or Professionals?
From Communications of the ACM

Computer Experts: Guns-For-Hire or Professionals?

Considering the responsibilities of those who build systems fundamental to significant social functions, institutions, and values.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account