acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Victorian Data Processing
From Communications of the ACM

Victorian Data Processing

The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...

From ACM Opinion

The Anthropology of Hackers

A "hacker" is a technologist with a love for computing and a "hack" is a clever technical solution arrived through a non-obvious means. It doesn't mean to compromise...

The School of Hard Drives
From ACM Opinion

The School of Hard Drives

U.S. Secretary of Education Arne Duncan answers questions pertaining to education and technology.

School For Hackers
From ACM Opinion

School For Hackers

The do-it-yourself movement revives learning by doing.

Objects Never? Well, Hardly Ever!
From Communications of the ACM

Objects Never? Well, Hardly Ever!

Revisiting the Great Objects Debate.

Discussing Cyber Attack
From Communications of the ACM

Discussing Cyber Attack

Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.

Principles of the Law of Software Contracts
From Communications of the ACM

Principles of the Law of Software Contracts

An overview of a new set of legal principles for software contracts developed by the American Law Institute.

Return at Risk
From Communications of the ACM

Return at Risk

Calculating the likely true cost of projects.

From ACM Opinion

Beloit College Mindset List For the Class of 2014

Born when Ross Perot was warning about a giant sucking sound and Bill Clinton was apologizing for pain in his marriage, members of this fall’s entering college...

Rights For Autonomous Artificial Agents?
From Communications of the ACM

Rights For Autonomous Artificial Agents?

The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.

Remembrances of Things Pest
From Communications of the ACM

Remembrances of Things Pest

Recalling malware milestones.

Presenting Your Project
From Communications of the ACM

Presenting Your Project

The what, the how, and the why of giving an effective presentation.

Has China Caught Up in IT?
From Communications of the ACM

Has China Caught Up in IT?

An assessment of the relative achievements in IT infrastructure, firms, and innovation in China.

Preparing Computer Science Students For the Robotics Revolution
From Communications of the ACM

Preparing Computer Science Students For the Robotics Revolution

Robotics will inspire dramatic changes in the CS curriculum.

Is the Internet a Maturing Market?
From Communications of the ACM

Is the Internet a Maturing Market?

Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband...

From ACM Opinion

Cutting and Pasting: A Senior Thesis By (insert Name)

A friend who teaches at a well-known eastern university told me recently that plagiarism was turning him into a cop.

The Medium Is the Medium
From ACM Opinion

The Medium Is the Medium

Recently, book publishers got some good news. Researchers gave 852 disadvantaged students 12 books (of their own choosing) to take home at the end of the school...

Joel Adams Discusses the Career Outlook For CS Students
From ACM Opinion

Joel Adams Discusses the Career Outlook For CS Students

If you’re ambivalent about a career in computer science, you should read Joel Adams’ The Market For Computing Careers.

Advice to Members Seeking ACM Distinction
From Communications of the ACM

Advice to Members Seeking ACM Distinction

ACM's Distinguished Member Recognition Program recognizes members in three categories: Educator, Engineer, and Scientist. Each category...

Cultivating Cultural Diversity in Information Technology
From Communications of the ACM

Cultivating Cultural Diversity in Information Technology

Introducing CMD-IT, a new center focused on synergistic activities related to ethnic minorities and people with disabilities.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account