acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Politics of 'Real Names'
From Communications of the ACM

The Politics of 'Real Names'

Power, context, and control in networked publics.

Will Massive Open Online Courses Change How We Teach?
From Communications of the ACM

Will Massive Open Online Courses Change How We Teach?

Sharing recent experiences with the massive open artificial intelligence course developed and conducted by Stanford faculty Sebastian Thrun and Peter Norvig.  

Inside the Hermit Kingdom
From Communications of the ACM

Inside the Hermit Kingdom: IT and Outsourcing in North Korea

North Korea has a sizeable IT sector. Some 10,000 professionals work in the field, and many more have IT degrees. They are already engaged in outsourcing contracts...

Why Google Glass Is the Next Frontier For Developers
From ACM Opinion

Why Google Glass Is the Next Frontier For Developers

When Google co-founder Sergey Brin demoed Google Glass, the search giant's attempt to build a next-generation wearable computer, with skydivers live streaming their...

How To Make a Viral Hit in Four Easy Steps
From ACM Opinion

How To Make a Viral Hit in Four Easy Steps

Last Wednesday, BuzzFeed's Jack Shepherd published an irresistible piece called, "21 Pictures That Will Restore Your Faith in Humanity." The post is exactly as...

From ACM Opinion

Microsoft Is the Most Exciting Company in Tech, Hands Down

I never thought I'd ever hear myself utter such words post-1995. But after the reveal of the Surface tablet—complete with an ultra-thin, pressure-sensitive keyboard...

The Challenges of Privacy By Design
From Communications of the ACM

The Challenges of Privacy By Design

Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense challenges, including management...

Google's Hybrid Approach to Research
From Communications of the ACM

Google's Hybrid Approach to Research

By closely connecting research and development Google is able to conduct experiments on an unprecedented scale, often resulting in new capabilities for the company...

An Information Strategy For Environmental Sustainability
From Communications of the ACM

An Information Strategy For Environmental Sustainability

Many proposed solutions to the species-threatening transformations born of human industrialization have an engineering orientation. Often the suggested remedies...

Can Online Piracy Be Stopped By Laws?
From Communications of the ACM

Can Online Piracy Be Stopped By Laws?

Considering the legal responsibilities of Internet intermediaries in the aftermath of the Stop Online Privacy Act controversy.

Business Models For Strategy and Innovation
From Communications of the ACM

Business Models For Strategy and Innovation

While often ambiguously defined, business models are central to innovation.

How Depressives Surf the Web
From ACM News

How Depressives Surf the Web

In what way do you spend your time online? Do you check your email compulsively? Watch lots of videos? Switch frequently among multiple Internet applications—from...

How To Fix the Gender Gap in Technology
From ACM Opinion

How To Fix the Gender Gap in Technology

The United States has produced viable female presidential candidates, women athletes who command millions of dollars in endorsements, and the first female Nobel...

Are We Living in Bradbury's Fahrenheit 451?
From ACM Opinion

Are We Living in Bradbury's Fahrenheit 451?

Science-fiction author Ray Bradbury, one of the world's leading writers of the genre for more than 60 years, died on Wednesday at the age of 91. Although he wrote...

A Measure of Control
From Communications of the ACM

A Measure of Control

Some limitations on measurements in software.

The Cybersecurity Risk
From Communications of the ACM

The Cybersecurity Risk

Increased attention to cybersecurity has not resulted in improved cybersecurity.

Security of the Internet and the Known Unknowns
From Communications of the ACM

Security of the Internet and the Known Unknowns

Seeking answers to questions about Internet vulnerabilities.

The Myth of the Elevator Pitch
From Communications of the ACM

The Myth of the Elevator Pitch

Instead of pitching, listen and offer.

Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security Policy
From Communications of the ACM

Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security Policy

Cybersecurity and policy issues for computer scientists.

I (robot) Thee Wed
From ACM Opinion

I (robot) Thee Wed

It's hard to think of a more attention-grabbing title than "Robots, Men, and Sex Tourism"—especially in the academic world.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account