acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Nature's Hidden Prime Number Code
From ACM Opinion

Nature's Hidden Prime Number Code

Ever since humans evolved on this planet we have been trying to make sense of the world around us. We have attempted to explain why the world looks and behaves...

Why Twitter Should Double Its Character Limit
From ACM Opinion

Why Twitter Should Double Its Character Limit

Five years ago this month, Twitter opened itself up to the public. The new service, initially called Twttr, was born out of software engineer Jack Dorsey's fascination...

Journals For Certification, Conferences For Rapid Dissemination
From Communications of the ACM

Journals For Certification, Conferences For Rapid Dissemination

The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice...

Storage Strife
From Communications of the ACM

Storage Strife

Beware keeping data in binary format.

As Simple As Possible ? But Not More So
From Communications of the ACM

As Simple As Possible ? But Not More So

An assessment of the U.S. government's EINSTEIN project.

From Interests to Values
From Communications of the ACM

From Interests to Values

Computer science is not that difficult but wanting to learn it is.

Geography Is Alive and Well in Virtual Teams
From Communications of the ACM

Geography Is Alive and Well in Virtual Teams

Just because a team is virtual, it doesn't mean geography is dead.

It Operations in Flux as Cloud Computing Adoption Increases, Survey Finds
From ACM Opinion

It Operations in Flux as Cloud Computing Adoption Increases, Survey Finds

A recent survey finds that with increasing reliance on cloud computing, IT executives are uncertain about the role of IT operations but also plan to invest in...

Applying Graph Analysis and Manipulation to Data Stores
From ACM Opinion

Applying Graph Analysis and Manipulation to Data Stores

Marko Rodriguez and Peter Neubauer, the leaders of the TinkerPop open-source graph software initiative, discuss the project, its members, and its goals.

Non-Myths About Programming
From Communications of the ACM

Non-Myths About Programming

Viewing computer science in a broader context to dispel common misperceptions and provide more accurate guidance to students who are...

The Status of Women of Color in Computer Science
From Communications of the ACM

The Status of Women of Color in Computer Science

Addressing the challenges of increasing the number of women of color in computing and ensuring their success.

Too Many Copyrights?
From Communications of the ACM

Too Many Copyrights?

Reinstituting formalities — notice of copyright claims and registration requirements — could help address problems related to too many copyrights that last for...

Values in Design
From Communications of the ACM

Values in Design

Focusing on socio-technical design with values as a critical component in the design process.

Driving Power in Global Supply Chains
From Communications of the ACM

Driving Power in Global Supply Chains

Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...

Computer Science Can Use More Science
From Communications of the ACM

Computer Science Can Use More Science

Software developers should use empirical methods to analyze their designs to predict how working systems will behave.

The Risks of Stopping Too Soon
From Communications of the ACM

The Risks of Stopping Too Soon

Good software design is never easy, but stopping too soon makes the job more difficult.

Practical Application of Theoretical Estimation
From Communications of the ACM

Practical Application of Theoretical Estimation

One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...

Who Are We - Now?
From Communications of the ACM

Who Are We - Now?

Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.

Identity Management and Privacy
From Communications of the ACM

Identity Management and Privacy: A Rare Opportunity To Get It Right

The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...

Take IT Out of the IT Department
From ACM Opinion

Take IT Out of the IT Department

It's time to reverse the trend of centralized information technology that has been the hallmark of most companies for at least 10 years. Control of IT shouldn't...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account