acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Having a Conversation About Bulk Surveillance
From Communications of the ACM

Having a Conversation About Bulk Surveillance

Considering a controversial subject that extends far beyond the collection of phone metadata.

Lessons from the Tech Transfer Trenches
From Communications of the ACM

Lessons from the Tech Transfer Trenches

Moving from the research realm to real-world business application.

Code Hoarding
From Communications of the ACM

Code Hoarding

Committing to commits, and the beauty of summarizing graphs.

Broadening Access to Computing Education State By State
From Communications of the ACM

Broadening Access to Computing Education State By State

Influencing computer science education at the state level.

Privacy Research Directions
From Communications of the ACM

Privacy Research Directions

What must we learn in order to support privacy requirements as technology advances?

Learning to Apply Data Science to Business Problems
From ACM Opinion

Learning to Apply Data Science to Business Problems

One of the most exciting parts of data science is that it can be applied to many domains of knowledge, given our newfound ability to gather valuable data on almost...

Genome-Editing Revolution: My Whirlwind Year with Crispr
From ACM Opinion

Genome-Editing Revolution: My Whirlwind Year with Crispr

Some 20 months ago, I started having trouble sleeping.

Why Knowledge Representation Matters
From Communications of the ACM

Why Knowledge Representation Matters

A personal story: From philosophy to software.

Unbalanced Data Leads to Obsolete Economic Advice
From Communications of the ACM

Unbalanced Data Leads to Obsolete Economic Advice

Few computer scientists and technological workers worry about their role in the economies of their industries and their countries. Background supplementary material...

Where Code Comes From
From Communications of the ACM

Where Code Comes From: Architectures of Automatic Control from Babbage to Algol

Considering the evolving concept of programming.

The Chaos Machine
From Communications of the ACM

The Chaos Machine

Complexity, predictability, and modern projects.

Extrapolating from Moore's Law
From Communications of the ACM

Extrapolating from Moore's Law

Behind and beyond Microsoft, Intel, and Apple.

Biometric Identity
From Communications of the ACM

Biometric Identity

Assessing the promises and dangers of biometric identity plans.

The Death of American Research and Development
From ACM Opinion

The Death of American Research and Development

When rumors began to fly about a merger between chemical giants Dow Chemical  and DuPont , it was obvious the deal was not your ordinary fee-driven scheme dreamed...

Creating a New Generation of Computational Thinkers
From Communications of the ACM

Creating a New Generation of Computational Thinkers

Experiences with a successful school program in Scotland.

The Case For Banning Killer Robots
From Communications of the ACM

The Case For Banning Killer Robots: Point

Ban the bots? Considering both sides of the argument for and against.

I Can't Let You Do That, Dave
From Communications of the ACM

I Can't Let You Do That, Dave

Computers should not treat their owners as adversaries.

Increasing the Participation of Individuals with Disabilities in Computing
From Communications of the ACM

Increasing the Participation of Individuals with Disabilities in Computing

Lessons learned from a decade of practice.

Coupled Ethical-Epistemic Analysis in Teaching Ethics
From Communications of the ACM

Coupled Ethical-Epistemic Analysis in Teaching Ethics

Critical reflection on value choices.

Why Our Theories of Innovation Fail Us
From Communications of the ACM

Why Our Theories of Innovation Fail Us

Until we moderate our fascination with creating ideas, we will not achieve the rate of innovations we seek.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account