acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Should the Google Book Settlement Be Approved?
From Communications of the ACM

Should the Google Book Settlement Be Approved?

Considering the precedent that could be established by approval of the controversial Google book settlement.

Work Life in the Robotic Age
From Communications of the ACM

Work Life in the Robotic Age

Technological change results in changes in expectations, in this case affecting the workplace.

Outsourcing Versus Shared Services
From Communications of the ACM

Outsourcing Versus Shared Services

Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.

In Defense of Computers and the Internet For Learning
From ACM Opinion

In Defense of Computers and the Internet For Learning

If you’re reading this blog post on a computer, mobile phone or e-reader, please stop what you’re doing immediately. You could be making yourself stupid. And whatever...

Does the Internet Make You Smarter or Dumber?
From ACM Opinion

Does the Internet Make You Smarter or Dumber?

Amid the silly videos and spam are the roots of a new reading and writing culture, says Clay Shirky.

Institutional Review Boards and Your Research
From Communications of the ACM

Institutional Review Boards and Your Research

Researchers in computer science departments throughout the U.S. are violating federal law and their own organization's...

Intel's Rebates: Above Board or Below the Belt?
From Communications of the ACM

Intel's Rebates: Above Board or Below the Belt?

Over several years, Intel paid billions of dollars to its customers. Was it to force them to boycott products developed by its rival AMD or so they could sell its...

Privacy By Design: Moving From Art to Practice
From Communications of the ACM

Privacy By Design: Moving From Art to Practice

Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...

Myths and Fallacies of 'Personally Identifiable Information'
From Communications of the ACM

Myths and Fallacies of 'Personally Identifiable Information'

Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...

Sociologists Invade World of Warcraft, See Humanity's Future
From ACM Opinion

Sociologists Invade World of Warcraft, See Humanity's Future

In their continued quest to plumb the mysterious depths of human interactions, some sociologists have stopped watching people—and started watching their avatars...

Interview With Dr. Bruno Bachimont
From ACM Opinion

Interview With Dr. Bruno Bachimont

Bruno Bachimont, scientific advisor of the Department of Research and Innovation at France's Institut National de l'Audiovisuel, discusses the constructive mix...

The Disruptive Future of Printing
From ACM Opinion

The Disruptive Future of Printing

Imagine a school where a student could sketch out an idea for a new design of bicycle and not only draw it in 3D using a computer-aided design package but actually...

Why We Should Learn the Language of Data
From ACM Opinion

Why We Should Learn the Language of Data

"How can global warming be real when there’s so much snow?" Hearing that question—repeatedly—this past February drove Joseph Romm nuts. A massive snowstorm had...

Great Computing Museums of the World, Part Two
From Communications of the ACM

Great Computing Museums of the World, Part Two

The second of a two-part series highlighting several of the world's museums dedicated to preserving, exhibiting, and elucidating computing history.

Is Mobile Email Addiction Overlooked?
From Communications of the ACM

Is Mobile Email Addiction Overlooked?

Studying the prevalence of mobile email addiction and the associated possible implications for organizations.

Can IT Lean Against the Wind?
From Communications of the ACM

Can IT Lean Against the Wind?

Lessons from the global financial crisis.

How to Make Progress in Computing Education
From Communications of the ACM

How to Make Progress in Computing Education

Improving the research base for computing education requires securing competitive funding commitments.

Cloud Computing and Electricity: Beyond the Utility Model
From Communications of the ACM

Cloud Computing and Electricity: Beyond the Utility Model

Assessing the strengths, weaknesses, and general applicability of the computing-as-utility business model.

From ACM Opinion

­ndergraduate Computer Science Education in China

Professional computing education for undergraduate majors and fundamental computer education for non-majors has evolved in China over the past decade as the nation...

When Network Neutrality Met Privacy
From Communications of the ACM

When Network Neutrality Met Privacy

Incorporating the consideration of privacy into the ongoing debate concerning network neutrality.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account