acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

A Cynic

On July 17, 2008, Senator Barack Obama held a town hall meeting on national security at Purdue University. He and his panel covered issues of nuclear, biological...

From ACM Opinion

Connecting with an Internet Pioneer, 40 Years Later

Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...

Broken Builds
From Communications of the ACM

Broken Builds

Frequent broken builds could be symptomatic of deeper problems within a development project.

Computing's Paradigm
From Communications of the ACM

Computing's Paradigm

Trying to categorize computing as engineering, science, or math is fruitless; we have our own paradigm.

Israel's Technology Industry as an Economic Growth Engine
From Communications of the ACM

Israel's Technology Industry as an Economic Growth Engine

How government-industry collaboration can have far-reaching economic influences.

Opening Remarks
From Communications of the ACM

Opening Remarks

Highlighting efforts and providing the rationale to increase the participation and success of underrepresented groups in computing.

Next Siggest Security Threat Will Be Cyber-Terrorism
From ACM Opinion

Next Siggest Security Threat Will Be Cyber-Terrorism

The next biggest security threat may not be AK 47s or bomb blasts, but cyber terrorism. Terrorists can attack their enemy without stepping out of their home or...

Report: Cyberterror Not a Credible Threat
From ACM Opinion

Report: Cyberterror Not a Credible Threat

A new report by a Washington policy think tank dismisses out of hand the idea that terrorist groups are currently launching cyber attacks and says that the recent...

On Public Service and Computer Science
From Communications of the ACM

On Public Service and Computer Science

Members of the computer science community should become more involved in public service by becoming program managers at federal agencies, the opportunities and...

The Broadband Price Is Not Right
From Communications of the ACM

The Broadband Price Is Not Right

Developing an effective pricing index is essential to understanding the value of broadband connectivity.

Are Business Methods Patentable?
From Communications of the ACM

Are Business Methods Patentable?

How the U.S. Supreme Court's forthcoming decision in the Bilski v. Doll case is expected to affect existing and future software patents.

Usable Security: How to Get It
From Communications of the ACM

Usable Security: How to Get It

Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important...

From ACM TechNews

­.s. Must Focus on Protecting Critical Computer Networks From Cyber Attack

A study from the RAND Corp. suggests the United States should focus on defending critical civilian and military computer networks from cyberattack, but does not...

From ACM CareerNews

Government Should Help Widen Cyber Knowledge

The U.S. Department of Homeland Security should be doing more to recruit top cyber security talent and develop a highly skilled workforce of cyber security workers...

From ACM Opinion

Should Operating Systems Be Intuitive?

Should computers be intuitive, requiring little to no learning or thinking? Is it even possible for them to be so? “Nothing is intuitive,” said Slashdot blogger...

Retrospective: An Axiomatic Basis For Computer Programming
From Communications of the ACM

Retrospective: An Axiomatic Basis For Computer Programming

C.A.R. Hoare revisits his past Communications article on the axiomatic approach to programming and uses it as a touchstone for the future.

Kode Reviews 101
From Communications of the ACM

Kode Reviews 101

A review of code review do's and don'ts.

Dealing with the Venture Capital Crisis
From Communications of the ACM

Dealing with the Venture Capital Crisis

The venture capital industry, like financial services in general, has fallen on hard times. Part of the problem is that large payoffs...

Reflections on Conficker
From Communications of the ACM

Reflections on Conficker

Conficker's alarming growth rate in early 2009 along with the apparent mystery surrounding its ultimate purpose had raised concern among...

Computing in the Depression Era
From Communications of the ACM

Computing in the Depression Era

Since its beginning, the computer industry has been through several major recessions, each occurring  approximately five years...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account