acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Parting Shots from a Mars Rover
From ACM News

Parting Shots from a Mars Rover

NASA is no longer sending commands to the Spirit rover on Mars, but the long-silent robot still has a few more chances to phone home. Not that anyone is expecting...

Computer Science Can Use More Science
From Communications of the ACM

Computer Science Can Use More Science

Software developers should use empirical methods to analyze their designs to predict how working systems will behave.

Think Before You Fork
From Communications of the ACM

Think Before You Fork

Kode Vicious's thoughts on forking, config files, and using internal wikis.

The Risks of Stopping Too Soon
From Communications of the ACM

The Risks of Stopping Too Soon

Good software design is never easy, but stopping too soon makes the job more difficult.

Practical Application of Theoretical Estimation
From Communications of the ACM

Practical Application of Theoretical Estimation

One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...

Who Are We - Now?
From Communications of the ACM

Who Are We - Now?

Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.

The Importance of Reviewing the Code
From Communications of the ACM

The Importance of Reviewing the Code

Highlighting the significance of the often overlooked underlying software used to produce research results.

Reaching Learners Beyond Our Hallowed Halls
From Communications of the ACM

Reaching Learners Beyond Our Hallowed Halls

Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.

Online Advertising, Behavioral Targeting, and Privacy
From Communications of the ACM

Online Advertising, Behavioral Targeting, and Privacy

Studying how privacy regulation might impact economic activity on the advertising-supported Internet.

Asymmetries and Shortages of the Network Neutrality Principle
From Communications of the ACM

Asymmetries and Shortages of the Network Neutrality Principle

Since the beginning of the debate on network neutrality, and perhaps as an inheritance of that beginning, the controversy has been restricted...

Coder's Block
From Communications of the ACM

Coder's Block

Programming is a creative endeavor, and therefore there is such a thing as coder's block. What does it take to clear the blockage?

Platform Wars Come to Social Media
From Communications of the ACM

Platform Wars Come to Social Media

The world can absorb more social media sites, but how many?

Building Castles in the Air
From Communications of the ACM

Building Castles in the Air

Reflections on recruiting and training programmers during the early period of computing.

Managing Global IT Teams: Considering Cultural Dynamics
From Communications of the ACM

Managing Global IT Teams: Considering Cultural Dynamics

Successful global IT team managers combine general distributed team management skills enhanced with cultural sensitivity.

Managing Time
From Communications of the ACM

Managing Time

Professionals overwhelmed with information glut can find hope from new insights about time management.

Technology, Conferences, and Community
From Communications of the ACM

Technology, Conferences, and Community

Considering the impact and implications of changes in scholarly communication.

From Science to Engineering
From Communications of the ACM

From Science to Engineering

A series of recent reports claim the U.S. education system is in a very severe crisis; others suggest the crisis is...

Forest For the Trees
From Communications of the ACM

Forest For the Trees

With the amount of disk space available to the modern programmer, and the lack of parental supervision in most...

The Growing Harm of Not Teaching Malware
From Communications of the ACM

The Growing Harm of Not Teaching Malware

Revisiting the need to educate professionals to defend against malware in its various guises.

Against Cyberterrorism
From Communications of the ACM

Against Cyberterrorism

Cyberterrorism is a concept that appears recurrently in contemporary media. This coverage is particularly interesting...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account