acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Need For a National Cybersecurity R&D Agenda
From Communications of the ACM

The Need For a National Cybersecurity R&D Agenda

Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.

Why an Informatics Degree?
From Communications of the ACM

Why an Informatics Degree?

Isn't computer science enough?

The Good, the Bad and the ­gly: Reflections on the Nsf Supercomputer Center Program
From ACM Opinion

The Good, the Bad and the ­gly: Reflections on the Nsf Supercomputer Center Program

In a position paper for community input at NSF's Future of High Performance Computing Workshop in early December, Calit2 Director Larry Smarr reviewed the successes...

Broken Builds
From Communications of the ACM

Broken Builds

Frequent broken builds could be symptomatic of deeper problems within a development project.

Computing's Paradigm
From Communications of the ACM

Computing's Paradigm

Trying to categorize computing as engineering, science, or math is fruitless; we have our own paradigm.

From Communications of the ACM

Steering Self-Learning Distance Algorithms

The concept of distance expresses the distortion measure between any pair of entities lying in a common space. Distances...

Usable Security: How to Get It
From Communications of the ACM

Usable Security: How to Get It

Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important...

From ACM Opinion

The Duct Tape Programmer

Jamie Zawinski is what I would call a duct-tape programmer. I say that with a great deal of respect. He is the kind of programmer who is hard at work building...

Retrospective: An Axiomatic Basis For Computer Programming
From Communications of the ACM

Retrospective: An Axiomatic Basis For Computer Programming

C.A.R. Hoare revisits his past Communications article on the axiomatic approach to programming and uses it as a touchstone for the future.

Kode Reviews 101
From Communications of the ACM

Kode Reviews 101

A review of code review do's and don'ts.

Dealing with the Venture Capital Crisis
From Communications of the ACM

Dealing with the Venture Capital Crisis

The venture capital industry, like financial services in general, has fallen on hard times. Part of the problem is that large payoffs...

Reflections on Conficker
From Communications of the ACM

Reflections on Conficker

Conficker's alarming growth rate in early 2009 along with the apparent mystery surrounding its ultimate purpose had raised concern among...

Computing in the Depression Era
From Communications of the ACM

Computing in the Depression Era

Since its beginning, the computer industry has been through several major recessions, each occurring  approximately five years...

Contagious Craziness, Spreading Sanity
From Communications of the ACM

Contagious Craziness, Spreading Sanity

Some examples of the upward or downward spiral of behaviors in the workplace.

Face the Inevitable, Embrace Parallelism
From Communications of the ACM

Face the Inevitable, Embrace Parallelism

Hardware, software, and applications must all evolve in anticipation of the proliferation of parallelism.

Computing: The Fourth Great Domain of Science
From Communications of the ACM

Computing: The Fourth Great Domain of Science

Computing is as fundamental as the physical, life, and social sciences.

Viewpoint: Time For Computer Science to Grow Up
From Communications of the ACM

Viewpoint: Time For Computer Science to Grow Up

As the computer science field has evolved, so should the methods for disseminating computing research results.

Education: Alice 3
From Communications of the ACM

Education: Alice 3: Concrete to Abstract

The innovative Alice 3 programming environment, currently in beta testing, teaches students to program with Alice and Java software.

Open, Closed, or Clopen Access?
From Communications of the ACM

Open, Closed, or Clopen Access?

A frequent question I hear about Communications, and about ACM publishing in general, involves its access model. I am asked: "Why don't you adopt the open-access...

Ten of the Coolest and Most Powerful Supercomputers of All Time
From ACM Opinion

Ten of the Coolest and Most Powerful Supercomputers of All Time

For decades, supercomputers have helped scientists perform calculations that would not have been possible on regular computers of that time. Not only has the construction...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account