acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Trouble With Online Education
From ACM Opinion

The Trouble With Online Education

"Ah, you're a professor. You must learn so much from your students."

Marissa Mayer Is in Over Her Head
From ACM Opinion

Marissa Mayer Is in Over Her Head

One evening in the spring of 1999, Marissa Mayer got a recruiting email from a tiny search company. "I was in a long-distance relationship at the time, so I was...

Can We Fix Computer Science Education in America?
From ACM Opinion

Can We Fix Computer Science Education in America?

The tech sector is set to grow faster than all but five industries by 2020. Out of those fields, half of which are related to healthcare, tech pays the best with...

Why Google Glass Is the Next Frontier For Developers
From ACM Opinion

Why Google Glass Is the Next Frontier For Developers

When Google co-founder Sergey Brin demoed Google Glass, the search giant's attempt to build a next-generation wearable computer, with skydivers live streaming their...

The Challenges of Privacy By Design
From Communications of the ACM

The Challenges of Privacy By Design

Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense challenges, including management...

Google's Hybrid Approach to Research
From Communications of the ACM

Google's Hybrid Approach to Research

By closely connecting research and development Google is able to conduct experiments on an unprecedented scale, often resulting in new capabilities for the company...

Alan Turing's Other Universal Machine
From Communications of the ACM

Alan Turing's Other Universal Machine

All computer scientists know about the Universal Turing Machine, one of the foundation stones of theoretical computer science. Much less well known is the practical...

An Information Strategy For Environmental Sustainability
From Communications of the ACM

An Information Strategy For Environmental Sustainability

Many proposed solutions to the species-threatening transformations born of human industrialization have an engineering orientation. Often the suggested remedies...

Can Online Piracy Be Stopped By Laws?
From Communications of the ACM

Can Online Piracy Be Stopped By Laws?

Considering the legal responsibilities of Internet intermediaries in the aftermath of the Stop Online Privacy Act controversy.

Business Models For Strategy and Innovation
From Communications of the ACM

Business Models For Strategy and Innovation

While often ambiguously defined, business models are central to innovation.

Alan Turing: Why the Tech World's Hero Should Be a Household Name
From ACM Opinion

Alan Turing: Why the Tech World's Hero Should Be a Household Name

I've worked in computing, and more specifically computer networking, nearly all my life. It's an industry in a constant state of innovation, always pushing beyond...

How To Fix the Gender Gap in Technology
From ACM Opinion

How To Fix the Gender Gap in Technology

The United States has produced viable female presidential candidates, women athletes who command millions of dollars in endorsements, and the first female Nobel...

Are We Living in Bradbury's Fahrenheit 451?
From ACM Opinion

Are We Living in Bradbury's Fahrenheit 451?

Science-fiction author Ray Bradbury, one of the world's leading writers of the genre for more than 60 years, died on Wednesday at the age of 91. Although he wrote...

Can America Ever Have Another 'sputnik Moment'?
From ACM Opinion

Can America Ever Have Another 'sputnik Moment'?

In his 2011 State of the Union Address, President Obama declared, "This is our generation's Sputnik moment." Sputnik was the satellite that the Soviets had launched...

A Measure of Control
From Communications of the ACM

A Measure of Control

Some limitations on measurements in software.

The Cybersecurity Risk
From Communications of the ACM

The Cybersecurity Risk

Increased attention to cybersecurity has not resulted in improved cybersecurity.

Scale Failure
From Communications of the ACM

Scale Failure

Using a tool for the wrong job is OK until the day when it isn't.

Security of the Internet and the Known Unknowns
From Communications of the ACM

Security of the Internet and the Known Unknowns

Seeking answers to questions about Internet vulnerabilities.

The Myth of the Elevator Pitch
From Communications of the ACM

The Myth of the Elevator Pitch

Instead of pitching, listen and offer.

Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security Policy
From Communications of the ACM

Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security Policy

Cybersecurity and policy issues for computer scientists.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account