acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

Why Telecom Regulation Needs to Change

Research suggests that the approach that worked with a few large companies with aligned interests needs revisiting in the Internet age.

Score: Agile Research Group Management
From Communications of the ACM

Score: Agile Research Group Management

Adapting agile software development methodology toward more efficient management of academic research groups.

Version Aversion
From Communications of the ACM

Version Aversion

The way you number your releases communicates more than you might think.

Victorian Data Processing
From Communications of the ACM

Victorian Data Processing

The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...

Friends Without Benefits
From ACM Opinion

Friends Without Benefits

The Valley used to be a place run by scientists and engineers, people like Robert Noyce, the Ph.D. physicist who helped invent the integrated circuit and cofounded...

From ACM Opinion

The Anthropology of Hackers

A "hacker" is a technologist with a love for computing and a "hack" is a clever technical solution arrived through a non-obvious means. It doesn't mean to compromise...

From ACM Opinion

Robots vs. Suicide Terrorists

In February 2008, a pair of suicide bombers struck the Israeli town of Dimona. One of the attackers detonated his explosive vest, killing an Israeli, and injuring...

Ban Drone-Porn War Crimes
From ACM Opinion

Ban Drone-Porn War Crimes

Death by joystick is immoral and illegal.

Is Wikileaks Too Full of Itself?
From ACM Opinion

Is Wikileaks Too Full of Itself?

Have the activists behind WikiLeaks—and in particular the Web site's founder, Julian Assange—become intoxicated by their own myth? Two recent events involving...

From ACM Opinion

Grim Numbers Point to the End of the Venture Capital Era

Silicon Valley has passed an important milestone that may mark the end of one era and the beginning of another.

From ACM Opinion

Defending a New Domain: The Pentagon

Right now, more than 100 foreign intelligence organizations are trying to hack into the digital networks that undergird U.S. military operations. The Pentagon...

Objects Never? Well, Hardly Ever!
From Communications of the ACM

Objects Never? Well, Hardly Ever!

Revisiting the Great Objects Debate.

Discussing Cyber Attack
From Communications of the ACM

Discussing Cyber Attack

Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.

Principles of the Law of Software Contracts
From Communications of the ACM

Principles of the Law of Software Contracts

An overview of a new set of legal principles for software contracts developed by the American Law Institute.

Return at Risk
From Communications of the ACM

Return at Risk

Calculating the likely true cost of projects.

From ACM Opinion

Why Intel Bought Mcafee

There's been quite a bit of head-scratching over Intel's decision to purchase McAfee, but, despite all the breathless talk about mobile security and ARM and virus...

From ACM Opinion

Will Someone Leak the Leaker's Secrets?

Who has the right to decide what information should be kept secret? That's the vexatious question raised by WikiLeaks and its founder Julian Assange, who masterminded...

From ACM Opinion

A Review of Verizon and Google's Net Neutrality Proposal

Efforts to protect net neutrality that involve government regulation have always faced one fundamental obstacle: the substantial danger that the regulators will...

Qualifications Needed to Be Hp's Next Ceo
From ACM Opinion

Qualifications Needed to Be Hp's Next Ceo

The world's largest technology company by revenue and the outfit that birthed Silicon Valley has very suddenly and unexpectedly put out a figurative "help wanted"...

From ACM Opinion

Evil?

The alleged Google-Verizon deal that's endangering net neutrality.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account