acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Why Lulzsec Had No Choice but to Disband
From ACM Opinion

Why Lulzsec Had No Choice but to Disband

After just 50 days, the group said it was ceasing individual operations. Why, when you might have thought things were going so well?

Applying Graph Analysis and Manipulation to Data Stores
From ACM Opinion

Applying Graph Analysis and Manipulation to Data Stores

Marko Rodriguez and Peter Neubauer, the leaders of the TinkerPop open-source graph software initiative, discuss the project, its members, and its goals.

From ACM Opinion

Supporting Choice, Ensuring Economic Opportunity

At Google, we’ve always focused on putting the user first. We aim to provide relevant answers as quickly as possible—and our product innovation and engineering...

From ACM News

Big Win For the Losers at D-Wave

Does D-Wave's first big sale disprove the quantum computing naysayers?

Values in Design
From Communications of the ACM

Values in Design

Focusing on socio-technical design with values as a critical component in the design process.

Driving Power in Global Supply Chains
From Communications of the ACM

Driving Power in Global Supply Chains

Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...

From ACM Opinion

China's Cyberassault on America

In justifying U.S. involvement in Libya, the Obama administration cited the "responsibility to protect" citizens of other countries when their governments engage...

From ACM News

All Your Bitcoins Are Ours

Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...

From ACM News

Who Is Behind the Hacks?

Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...

From ACM Opinion

How I Failed, Failed, and Finally Succeeded at Learning How to Code

When Colin Hughes was about 11 years old his parents brought home a rather strange toy. It wasn't colorful or cartoonish; it didn't seem to have any lasers or...

From ACM Opinion

Internet Piracy and How to Stop It

Online piracy is a huge business. A recent study found that Web sites offering pirated digital content or counterfeit goods, like illicit movie downloads or bootleg...

Feds Versus the Hacker ­nderground: Army of Informers Turned By Fear
From ACM Opinion

Feds Versus the Hacker ­nderground: Army of Informers Turned By Fear

When Jeff Moss, popularly known as the Dark Tangent, started holding underground hacker conferences in Las Vegas he knew he had a problem. All previous gatherings...

Parting Shots from a Mars Rover
From ACM News

Parting Shots from a Mars Rover

NASA is no longer sending commands to the Spirit rover on Mars, but the long-silent robot still has a few more chances to phone home. Not that anyone is expecting...

Bill Would Keep Big Brother's Mitts Off Your Gps Data
From ACM News

Bill Would Keep Big Brother's Mitts Off Your Gps Data

The reauthorization of the Patriot Act looks like a forgone conclusion. But next month, a bipartisan band of legislators will try to mitigate a different kind...

From ACM Opinion

Windows 8: What Should Be, If You Ask Me

What's next for Microsoft Windows? With Windows 7 now 19 months old, plenty of people are curious about its successor, a product that everybody's calling Windows...

What Big Data Needs: A Code of Ethical Practices
From ACM Opinion

What Big Data Needs: A Code of Ethical Practices

In this era of Big Data, there is little that cannot be tracked in our online lives—or even in our offline lives. Consider one new Silicon Valley venture, called...

Think Before You Fork
From Communications of the ACM

Think Before You Fork

Kode Vicious's thoughts on forking, config files, and using internal wikis.

The Risks of Stopping Too Soon
From Communications of the ACM

The Risks of Stopping Too Soon

Good software design is never easy, but stopping too soon makes the job more difficult.

Practical Application of Theoretical Estimation
From Communications of the ACM

Practical Application of Theoretical Estimation

One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...

Who Are We - Now?
From Communications of the ACM

Who Are We - Now?

Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account