Sign In

Communications of the ACM

Table of Contents


DEPARTMENT: Editorial pointers

Editorial Pointers


DEPARTMENT: News track

News Track


DEPARTMENT: Forum

Forum


COLUMN: Technology strategy and management

Extreme Programming Compared with Microsoft-Style Iterative Development

Highlighting the similarities---although they might be superficial in some cases---in software development practices.
COLUMN: Legally speaking

Does Copyright Law Need to Be Reformed?

Considering the issues involved in developing a simplified new copyright law and associated administrative mechanisms.
COLUMN: Technical opinion

Reflections and Trends in the Expansion of Cellular Wireless Services in the ­U.S. and China

Charting the evolution of business capabilities and communication technology and standards.
COLUMN: Viewpoint

Why We Compete in DARPA's Urban Challenge Autonomous Robot Race

The robots will have to find their own way, sensing and predicting their whereabouts through automated perception, planning, and control.
COLUMN: International perspectives

Post-Conflict Communications: the Case of Liberia


Why 'Nearshore' Means that Distance Matters

When sourcing abroad, a growing number of companies now weigh whether the location is near vs. far.

Nearshore Locations in Three Principal Global Clusters and Their Respective Attributes


[Software Patents] The Good, the Bad, and the Messy

The goal of improving patent quality remains elusive both from an economic and process perspective.

Knowledge Services on the Semantic Web

Developing infrastructures for trading knowledge services using semantic technologies.

[Getting Ideas to Market] Current Issues Faced By Technology Entrepreneurs

A great idea does not always result in a successful product. Often the winners are the ones to make it over all the hurdles along the way.

Inspiring Students to Pursue Computing Degrees

Their aspirations are our possibilities.

Physical Product Reengineering with Embedded Information Technology

Physical products increasingly incorporate an IT component, requiring manufacturers to adapt their production and support processes.

Business Process Development Life Cycle Methodology

An innovative roadmap brings together the worlds of business processes and Web services, harnessing their power to construct industrial-strength business applications.

Business Applications of Unstructured Text

Crunching unstructured text rather than numbers is the basis for a new class of high-value applications ranging from regulatory compliance monitoring to business intelligence.

Social Phishing

Sometimes a "friendly" email message tempts recipients to reveal more online than they otherwise would, playing right into the sender's hand.

Necessary Measures: Metric-Driven Information Security Risk Assessment and Decision Making

Use measurable, reliable real-world metrics to improve information security decision making.

Leveraging the Flexibility of Your Data Warehouse

How data warehouse flexibility affects its use.

Deterring Internal Information Systems Misuse

Deterring employee intentions to misuse computer systems requires complementary technical and procedural controls.
DEPARTMENT: Hot links

Top 10 Downloads from ACM's Digital Library


COLUMN: Inside risks

Toward a Safer and More Secure Cyberspace