Sign In

Communications of the ACM

Recent Opinion



How Secure Is Cloud Computing?
From ACM TechNews

How Secure Is Cloud Computing?

The recent ACM Cloud Computing Security Workshop was the first event devoted specifically to the security of cloud computing systems. Speaker Whitfield Diffie,...

Cio Blast From the Past: 40 Years of Multics, 1969-2009
From ACM TechNews

Cio Blast From the Past: 40 Years of Multics, 1969-2009

Four decades ago, Multiplexed Information and Computing Service (Multics), widely considered the basis of contemporary time-sharing systems, was first employed...

Revamping DARPA Is Vital to Preserving the ­.s. Lead in It
From ACM Opinion

Revamping DARPA Is Vital to Preserving the ­.s. Lead in It

Government-funded basic and applied research at U.S. universities has been one of the pillars of the U.S. high tech sector. But at least in information technology...

Open Source Identity: Ruby on Rails Creator David Heinemeier Hansson
From ACM TechNews

Open Source Identity: Ruby on Rails Creator David Heinemeier Hansson

One of the most popular and successful open source software development initiatives is Ruby on Rails, created by David Heinemeier Hansson. "I think the fundamental...

An Interview with Ping Fu
From Communications of the ACM

An Interview with Ping Fu

Ping Fu, CEO of the digital shape sampling and processing company Geomagic, discusses her background, achievements, and challenges managing a company during a period...

Usable Security: How to Get It
From Communications of the ACM

Usable Security: How to Get It

Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important...

The A-Z of Programming Languages: Arduino's Tom Igoe
From ACM TechNews

The A-Z of Programming Languages: Arduino's Tom Igoe

Tom Igoe is a co-developer of the Arduino programming language, which he says was created out of a desire to provide a tool for teaching physical computing to artists...

An Interview With Brian Kernighan, Co-Developer of Awk and Ampl
From ACM TechNews

An Interview With Brian Kernighan, Co-Developer of Awk and Ampl

Brian Kernighan — a contributor to the development of the AWK and AMPL programming languages — says that he remains "very interested" in domain-specific languages...

Amit Yoran Talks Cybersecurity
From ACM TechNews

Amit Yoran Talks Cybersecurity

Amit Yoran, former cybersecurity director for the U.S. Department of Homeland Security, agrees with the findings of a review commissioned by President Barack Obama...

Geoffrey Fox, Director of Futuregrid
From ACM TechNews

Geoffrey Fox, Director of Futuregrid

The FutureGrid Program is a U.S. National Science Foundation-funded project to determine the best ways to connect supercomputers together, headed by Indiana University...

From ACM CareerNews

Government Should Help Widen Cyber Knowledge

The U.S. Department of Homeland Security should be doing more to recruit top cyber security talent and develop a highly skilled workforce of cyber security workers...

From ACM Opinion

The Duct Tape Programmer

Jamie Zawinski is what I would call a duct-tape programmer. I say that with a great deal of respect. He is the kind of programmer who is hard at work building...

From ACM Opinion

Should Operating Systems Be Intuitive?

Should computers be intuitive, requiring little to no learning or thinking? Is it even possible for them to be so? “Nothing is intuitive,” said Slashdot blogger...

Q&A: The Networker
From Communications of the ACM

Q&A: The Networker

Jon Kleinberg talks about algorithms, information flow, and the connections between Web search and social networks.

Retrospective: An Axiomatic Basis For Computer Programming
From Communications of the ACM

Retrospective: An Axiomatic Basis For Computer Programming

C.A.R. Hoare revisits his past Communications article on the axiomatic approach to programming and uses it as a touchstone for the future.

Kode Reviews 101
From Communications of the ACM

Kode Reviews 101

A review of code review do's and don'ts.

Dealing with the Venture Capital Crisis
From Communications of the ACM

Dealing with the Venture Capital Crisis

The venture capital industry, like financial services in general, has fallen on hard times. Part of the problem is that large payoffs...

Reflections on Conficker
From Communications of the ACM

Reflections on Conficker

Conficker's alarming growth rate in early 2009 along with the apparent mystery surrounding its ultimate purpose had raised concern among...

Computing in the Depression Era
From Communications of the ACM

Computing in the Depression Era

Since its beginning, the computer industry has been through several major recessions, each occurring  approximately five years...

Contagious Craziness, Spreading Sanity
From Communications of the ACM

Contagious Craziness, Spreading Sanity

Some examples of the upward or downward spiral of behaviors in the workplace.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account