acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Is Human Mobility Tracking a Good Idea?
From Communications of the ACM

Is Human Mobility Tracking a Good Idea?

Considering the trade-offs associated with human mobility tracking.

Reading CS Classics
From Communications of the ACM

Reading CS Classics

Revisiting required reading.

Improving Gender Composition in Computing
From Communications of the ACM

Improving Gender Composition in Computing

Combining academic and industry representation, the NCWIT Pacesetters program works to increase the participation of girls and women in computing.

Information Technology and Gross National Happiness
From Communications of the ACM

Information Technology and Gross National Happiness

Connecting digital technologies and happiness.

Can Services and Platform Thinking Help the U.S. Postal Service?
From Communications of the ACM

Can Services and Platform Thinking Help the U.S. Postal Service?

How the U.S. Postal Service might improve the efficiency of its delivery platform.

Good Reasons Not to Force Online Teaching
From ACM Opinion

Good Reasons Not to Force Online Teaching

The average teen spends 16.7 hours a week on the Internet, not counting time spent with e-mail. Yikes. It's a good thing the Indiana General Assembly dropped...

Nobody Wants to Learn How to Program
From ACM Opinion

Nobody Wants to Learn How to Program

Many programming tutorials begin with basic programming principles: variables, loops, data types. This is an obvious way to teach programming to adults, but not...

How Young Is Too Young to Learn to Code?
From ACM Opinion

How Young Is Too Young to Learn to Code?

When the American Academy of Pediatrics recommends that children under 2 spend exactly zero time in front of screens, what its members are concerned about is substitution—all...

From ACM Opinion

Is Ted Elitist?

In a nutshell, no. It certainly attracts people who are regarded as elite in their area of expertise. But the word "elitist" implies exclusionary, and there have...

The Artificiality of Natural User Interfaces
From Communications of the ACM

The Artificiality of Natural User Interfaces

Toward user-defined gestural interfaces.

Training Users vs. Training Soldiers
From Communications of the ACM

Training Users vs. Training Soldiers: Experiences from the Battlefield

How military training methods can be applied to more effectively teach computer users.

The Idea Idea
From Communications of the ACM

The Idea Idea

What if practices rather than ideas are the main source of innovation?

Do Software Copyrights Protect What Programs Do?
From Communications of the ACM

Do Software Copyrights Protect What Programs Do?

A case before the European Court of Justice has significant implications for innovation and competition in the software industry.

War 2.0: Cyberweapons and Ethics
From Communications of the ACM

War 2.0: Cyberweapons and Ethics

Considering the basic ethical questions that must be resolved in the new realm of cyberwarfare.

From ACM Opinion

Welcome to the Desktop Degree

Once upon a time, a very long time ago, in 1995 to be precise, a scholar named Eli Noam published an article in the prestigious journal Science under the titleElectronics...

How to Make Science and Tech Jobs More Enticing to Undergrads
From ACM Opinion

How to Make Science and Tech Jobs More Enticing to Undergrads

The number of U.S. undergraduate degrees being awarded in most STEM disciplines (science, technology, engineering and math) has risen steadily in recent years...

From ACM Opinion

Coding For Success

Hoxton, we have a problem. Much has been written about how we need to improve the way we educate our children about technology. This is all great, but it's not...

What Have We Learned About Software Engineering?
From Communications of the ACM

What Have We Learned About Software Engineering?

Upon closer examination, everything old appears to be new again in the realm of software engineering.

Emotion and Security
From Communications of the ACM

Emotion and Security

Examining the role of human emotional response in making complex security-related decisions.

Wanton Acts of Debuggery
From Communications of the ACM

Wanton Acts of Debuggery

Keep your debug messages clear, useful, and not annoying.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account