acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Computer Science Can Use More Science
From Communications of the ACM

Computer Science Can Use More Science

Software developers should use empirical methods to analyze their designs to predict how working systems will behave.

The Risks of Stopping Too Soon
From Communications of the ACM

The Risks of Stopping Too Soon

Good software design is never easy, but stopping too soon makes the job more difficult.

Practical Application of Theoretical Estimation
From Communications of the ACM

Practical Application of Theoretical Estimation

One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...

Who Are We - Now?
From Communications of the ACM

Who Are We - Now?

Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.

Identity Management and Privacy
From Communications of the ACM

Identity Management and Privacy: A Rare Opportunity To Get It Right

The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...

From ACM Opinion

Why Library Privacy Matters

Without library privacy, individuals might not engage in free and open inquiry for fear that their interactions with the library will be used against them.

From ACM News

Why You Can't Really Anonymize Your Data

One of the joys of the last few years has been the flood of real-world data sets being released by all sorts of organizations. These usually involve some record...

From ACM Opinion

Let in the Super-Immigrants!

The best way to improve the U.S. economy fast is to poach entrepreneurs from the rest of the world. So why do we make it so difficult for them to immigrate?

There's No Data Sheriff on the Wild Web
From ACM Opinion

There's No Data Sheriff on the Wild Web

A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...

Customers Had More Faith in Sony Than It Deserved
From ACM News

Customers Had More Faith in Sony Than It Deserved

In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services...

Data Privacy, Put to the Test
From ACM News

Data Privacy, Put to the Test

To the catalog of corporate "bigs" that worry a lot of us little people, add this: Big Data.

From ACM Opinion

Sony Hack Highlights Importance of Breach Analysis

Sony's apparent difficulty in figuring out the extent of the damage from the recent intrusion into its PlayStation Network, while frustrating for those affected...

From ACM Opinion

Iran's Answer to Stuxnet

Might a "halal Internet" be in the wings?

Your Iphone Is Tracking You. So What.
From ACM Opinion

Your Iphone Is Tracking You. So What.

Have you heard the news? Two researchers have discovered that the iPhone keeps a minute-by-minute, time-stamped log of everywhere you go. That’s right: Your phone...

Electronic Health Records Face Human Hurdles More Than Technological Ones
From ACM News

Electronic Health Records Face Human Hurdles More Than Technological Ones

In medicine, there's the patient and there's the chart. And the chart is paper.

The Importance of Reviewing the Code
From Communications of the ACM

The Importance of Reviewing the Code

Highlighting the significance of the often overlooked underlying software used to produce research results.

Bell Labs and Centralized Innovation
From Communications of the ACM

Bell Labs and Centralized Innovation

In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...

Reaching Learners Beyond Our Hallowed Halls
From Communications of the ACM

Reaching Learners Beyond Our Hallowed Halls

Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.

Online Advertising, Behavioral Targeting, and Privacy
From Communications of the ACM

Online Advertising, Behavioral Targeting, and Privacy

Studying how privacy regulation might impact economic activity on the advertising-supported Internet.

In the Digital Era Free Is Easy, So How Do You Persuade People to Pay?
From ACM Opinion

In the Digital Era Free Is Easy, So How Do You Persuade People to Pay?

To compete with piracy, content providers need clear value propositions that don't conflict with the product.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account