acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Too Many Copyrights?
From Communications of the ACM

Too Many Copyrights?

Reinstituting formalities — notice of copyright claims and registration requirements — could help address problems related to too many copyrights that last for...

Values in Design
From Communications of the ACM

Values in Design

Focusing on socio-technical design with values as a critical component in the design process.

Driving Power in Global Supply Chains
From Communications of the ACM

Driving Power in Global Supply Chains

Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...

Computer Science Can Use More Science
From Communications of the ACM

Computer Science Can Use More Science

Software developers should use empirical methods to analyze their designs to predict how working systems will behave.

The Risks of Stopping Too Soon
From Communications of the ACM

The Risks of Stopping Too Soon

Good software design is never easy, but stopping too soon makes the job more difficult.

Practical Application of Theoretical Estimation
From Communications of the ACM

Practical Application of Theoretical Estimation

One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...

Who Are We - Now?
From Communications of the ACM

Who Are We - Now?

Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.

Identity Management and Privacy
From Communications of the ACM

Identity Management and Privacy: A Rare Opportunity To Get It Right

The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...

Take IT Out of the IT Department
From ACM Opinion

Take IT Out of the IT Department

It's time to reverse the trend of centralized information technology that has been the hallmark of most companies for at least 10 years. Control of IT shouldn't...

The Importance of Reviewing the Code
From Communications of the ACM

The Importance of Reviewing the Code

Highlighting the significance of the often overlooked underlying software used to produce research results.

Bell Labs and Centralized Innovation
From Communications of the ACM

Bell Labs and Centralized Innovation

In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...

Reaching Learners Beyond Our Hallowed Halls
From Communications of the ACM

Reaching Learners Beyond Our Hallowed Halls

Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.

Online Advertising, Behavioral Targeting, and Privacy
From Communications of the ACM

Online Advertising, Behavioral Targeting, and Privacy

Studying how privacy regulation might impact economic activity on the advertising-supported Internet.

Asymmetries and Shortages of the Network Neutrality Principle
From Communications of the ACM

Asymmetries and Shortages of the Network Neutrality Principle

Since the beginning of the debate on network neutrality, and perhaps as an inheritance of that beginning, the controversy has been restricted...

Coder's Block
From Communications of the ACM

Coder's Block

Programming is a creative endeavor, and therefore there is such a thing as coder's block. What does it take to clear the blockage?

Platform Wars Come to Social Media
From Communications of the ACM

Platform Wars Come to Social Media

The world can absorb more social media sites, but how many?

Building Castles in the Air
From Communications of the ACM

Building Castles in the Air

Reflections on recruiting and training programmers during the early period of computing.

Managing Global IT Teams: Considering Cultural Dynamics
From Communications of the ACM

Managing Global IT Teams: Considering Cultural Dynamics

Successful global IT team managers combine general distributed team management skills enhanced with cultural sensitivity.

How We Know
From ACM News

How We Know

James Gleick's first chapter has the title "Drums That Talk." It explains the concept of information by looking at a simple example.

Computer and Information Science and Engineering: One Discipline, Many Specialties
From Communications of the ACM

Computer and Information Science and Engineering: One Discipline, Many Specialties

Mathematics is no longer the only foundation for computing and information research and education in academia.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account