acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

I'm Not a Real Scientist, and That's Okay

What kind of discipline is computer science? I thought it was a science when I received my bachelor's degree. I believed its subdiscipline software engineering...

On the Threshold of the Avatar Era
From ACM Opinion

On the Threshold of the Avatar Era

In a garage in Palo Alto, Calif., in the 1980s, some friends and I were the first humans to experience becoming avatars—that is, movable representations of ourselves...

From Communications of the ACM

In Support of Computer Science Teachers and the CSTA

If we want more computer science students, and if we want computer scientists to be understood for what we are, we must clarify the message about computer science...

Sensor Networks For the Sciences
From Communications of the ACM

Sensor Networks For the Sciences

Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.

Why Isn't Cyberspace More Secure?
From Communications of the ACM

Why Isn't Cyberspace More Secure?

Evaluating governmental actions—and inactions—toward improving cyber security and addressing future challenges.

Why Do Software Startups Patent (or Not)?
From Communications of the ACM

Why Do Software Startups Patent (or Not)?

Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.

K-12 Computational Learning
From Communications of the ACM

K-12 Computational Learning

Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.

Score: Agile Research Group Management
From Communications of the ACM

Score: Agile Research Group Management

Adapting agile software development methodology toward more efficient management of academic research groups.

Version Aversion
From Communications of the ACM

Version Aversion

The way you number your releases communicates more than you might think.

Victorian Data Processing
From Communications of the ACM

Victorian Data Processing

The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...

From ACM Opinion

The Anthropology of Hackers

A "hacker" is a technologist with a love for computing and a "hack" is a clever technical solution arrived through a non-obvious means. It doesn't mean to compromise...

The School of Hard Drives
From ACM Opinion

The School of Hard Drives

U.S. Secretary of Education Arne Duncan answers questions pertaining to education and technology.

School For Hackers
From ACM Opinion

School For Hackers

The do-it-yourself movement revives learning by doing.

Objects Never? Well, Hardly Ever!
From Communications of the ACM

Objects Never? Well, Hardly Ever!

Revisiting the Great Objects Debate.

Discussing Cyber Attack
From Communications of the ACM

Discussing Cyber Attack

Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.

Principles of the Law of Software Contracts
From Communications of the ACM

Principles of the Law of Software Contracts

An overview of a new set of legal principles for software contracts developed by the American Law Institute.

Return at Risk
From Communications of the ACM

Return at Risk

Calculating the likely true cost of projects.

From ACM Opinion

Beloit College Mindset List For the Class of 2014

Born when Ross Perot was warning about a giant sucking sound and Bill Clinton was apologizing for pain in his marriage, members of this fall’s entering college...

Rights For Autonomous Artificial Agents?
From Communications of the ACM

Rights For Autonomous Artificial Agents?

The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.

Remembrances of Things Pest
From Communications of the ACM

Remembrances of Things Pest

Recalling malware milestones.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account