acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Thumb Numbers
From Communications of the ACM

Thumb Numbers

Rules of thumb stated as numerical rules are enticing, but many are folk theorems that may not apply in your critical situation.

Learning from the Past to Face the Risks of Today
From Communications of the ACM

Learning from the Past to Face the Risks of Today

The Space Shuttle software program can provide guidance to today's projects.

From ACM Opinion

Measuring the Benefits of Tech Tools

When I was a young reporter we could not afford cellphones.

The Science in Computer Science
From Communications of the ACM

The Science in Computer Science

Computer science is in a period of renaissance as it rediscovers its science roots.

Human-Centered Computing
From Communications of the ACM

Human-Centered Computing: A New Degree For Licklider's World

Combining computing and psychology, J.C.R. Licklider's prescient ideas are being applied in contemporary educational settings.

Max Newman
From Communications of the ACM

Max Newman: Forgotten Man of Early British Computing

Reflections on a significant, yet often overlooked, computing pioneer.

Fair Use in Europe
From Communications of the ACM

Fair Use in Europe

Examining the mismatch between copyright law and technology-influenced evolving social norms in the European Union.

Are the Costs of 'Free' Too High in Online Education?
From Communications of the ACM

Are the Costs of 'Free' Too High in Online Education?

Considering the economic implications as educational institutions expand online learning initiatives.

Peacebuilding in a Networked World
From Communications of the ACM

Peacebuilding in a Networked World

Harnessing computing and communication technologies in fragile, conflict-stressed nations.

Code Abuse
From Communications of the ACM

Code Abuse

One programmer's extension is another programmer's abuse.

Cyber-Victimization and Cybersecurity in China
From Communications of the ACM

Cyber-Victimization and Cybersecurity in China

Seeking insights into cyberattacks associated with China. <!-- <em>To view a slide presentation with video commentary by the author, click here (xxx Mbytes)</em>...

The Problem with Hands-Free Dashboard Cellphones
From Communications of the ACM

The Problem with Hands-Free Dashboard Cellphones

Lawmakers misunderstand user experience of technology interface.

Funding Successful Research
From Communications of the ACM

Funding Successful Research

A proposal for result-based funding for research projects.

Can Computer Professionals and Digital Technology Engineers Help Reduce Gun Violence?
From Communications of the ACM

Can Computer Professionals and Digital Technology Engineers Help Reduce Gun Violence?

Ten idea seeds.

Ethics Viewpoints Efficacies
From Communications of the ACM

Ethics Viewpoints Efficacies

Seeking answers to ethical concerns.

Moods, Wicked Problems, and Learning
From Communications of the ACM

Moods, Wicked Problems, and Learning

Wicked problems and learning environments present tough mood challenges for leaders and teachers. Telepresence and sensory gadgets are unlikely to replace physical...

Academic Careers Workshop For Underrepresented Groups
From Communications of the ACM

Academic Careers Workshop For Underrepresented Groups

A longitudinal evaluation of the application of knowledge, skills, and attitudes of ACW participants.

A Copyright Challenge to Resales of Digital Music
From Communications of the ACM

A Copyright Challenge to Resales of Digital Music

A currently pending case will have significant implications for secondary markets in digital goods.

The Explosive Growth of Postdocs in Computer Science
From Communications of the ACM

The Explosive Growth of Postdocs in Computer Science

Considering the factors influencing the recent rapid increase in the number of postdoctoral positions in computer science.

Cloud Services Certification
From Communications of the ACM

Cloud Services Certification

How to address the lack of transparency, trust, and acceptance in cloud services.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account