Sign In

Communications of the ACM



Lazy Developers Are the Best Developers
From [email protected]

Lazy Developers Are the Best Developers

Lazy developers stick to the project scope while forcing the project team to understand and fix their own code and issues.

How to Support Research in Computer Science via Russian Scientific Foundations
From [email protected]

How to Support Research in Computer Science via Russian Scientific Foundations

Russia is lagging behind the world average in fields including medicine, the agricultural sciences, biotechnology, pharmacology, the social sciences, and computer...

Breaking the Chains of Freelance Slavery
From [email protected]

Breaking the Chains of Freelance Slavery

The idea of working from home is no longer novel, and there are a number of drawbacks to consider.

­Using Independent Technical Reviews to Ensure Project Success
From [email protected]

­Using Independent Technical Reviews to Ensure Project Success

By using independent technical reviews, management can have a third party audit software and ensure the dev team stays on track.

Governance and Oversight Coming to AI and Automation: Independent Audit of AI Systems
From [email protected]

Governance and Oversight Coming to AI and Automation: Independent Audit of AI Systems

Independent Audit of AI Systems is the next evolution of governance for artificial intelligence and automation.

Discovering Bugs, or Ensuring Success?
From Communications of the ACM

Discovering Bugs, or Ensuring Success?

Finding errors is not the same as making certain a software product works correctly.

A Software Architect Is the Person You Blame
From [email protected]

A Software Architect Is the Person You Blame

How efficient is your current software project, and could it potentially benefit from the addition of a software architect?

ACM Public Policy ­pdate: 100-Day Highlights
From [email protected]

ACM Public Policy ­pdate: 100-Day Highlights

Chronicling the First 100 Days this year of ACM's member-driven policy efforts in Europe and the U.S.

The Era of Hackers Is Over
From [email protected]

The Era of Hackers Is Over

The ability to hack algorithms and make data structures optimal was a virtue of programmers a few decades ago. The current reality is much different, with the ability...

How Can We Foster Inclusiveness?
From [email protected]

How Can We Foster Inclusiveness?

What can an individual do on a day-to-day basis to ensure that her/his environment fosters inclusiveness?

Empirical Answers to Important Software Engineering Questions (Part 1 of 2)
From [email protected]

Empirical Answers to Important Software Engineering Questions (Part 1 of 2)

Beyond the lamppost

It's Not the 'Why' Chromosome, It's the 'How'
From [email protected]

It's Not the 'Why' Chromosome, It's the 'How'

Women do like the raw technical aspects of computer science.

ACM's Open-Conference Principle and Political Reality
From [email protected]

ACM's Open-Conference Principle and Political Reality

The Open-Conference Principle is aimed at benefiting society.

Database Decay and What To Do About It
From [email protected]

Database Decay and What To Do About It

In our opinion, database decay results from the multi-department organization of large implementations.

A Jolt or Two (Part 1)
From [email protected]

A Jolt or Two (Part 1)

You cannot learn something if you think you already know it, and don't.

Making the World Fair and Just
From [email protected]

Making the World Fair and Just

Wendy Powley and Gloria Childress Townsend report on the National Center for Women & IT Annual Summit, themed "making the world fair and just."  

Here's Why Microsoft Cares About Basic Research — And You Should, Too
From [email protected]

Here's Why Microsoft Cares About Basic Research — And You Should, Too

Basic scientific research made today's technology possible, and it will lead to tomorrow's technological breakthroughs.

The Three Faces of Cyberwar
From [email protected]

The Three Faces of Cyberwar

The different aspects of cyberwar, and what can be done about them.

What Is Your Research Culture? Part 3: the Web of Science
From [email protected]

What Is Your Research Culture? Part 3: the Web of Science

Experienced institutions know that the Web of Science is inapplicable to the evaluation of computer science research and researchers. It is time that others learned...

Lessons from Winnie the Pooh: Sustainable Cyberinfrastructure
From [email protected]

Lessons from Winnie the Pooh: Sustainable Cyberinfrastructure

The longitudinal value of research data often accrues to disciplines other than those where it was created. We need a new model that judiciously balances investment...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account