acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

From ACM Opinion

Estimating Programming Time

Accurately estimating programming time is, in part, a process of defining limitations—experience, domain knowledge, speed vs. quality. It is also about thinking...

Steve Jobs and the Economics of Elitism
From ACM Opinion

Steve Jobs and the Economics of Elitism

The more, the better. That’s the fashionable recipe for nurturing new ideas these days. It emphasizes a kind of Internet-era egalitarianism that celebrates the...

From ACM Opinion

What Apple's Ipad Means For Your Wallet


From ACM Opinion

Don't Let Politicians Forget the E Word

Hugh Griffiths is chair of the executive committee of the Campaign for Science & Engineering (CaSE) and chair in intelligent radar systems at University College...

­.s. Enables Chinese Hacking of Google
From ACM Opinion

­.s. Enables Chinese Hacking of Google

Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such as Gmail, in a politically motivated attempt...

Taking Your Network's Temperature
From Communications of the ACM

Taking Your Network's Temperature

A prescription for capturing data to diagnose and debug a networking problem.

Open Access to Scientific Publications
From Communications of the ACM

Open Access to Scientific Publications

In his July 2009 Communications editor's letter "Open, Closed, or Clopen Access?", editor-in-chief Moshe Vardi addressed...

The Need For a National Cybersecurity R&D Agenda
From Communications of the ACM

The Need For a National Cybersecurity R&D Agenda

Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.

Why an Informatics Degree?
From Communications of the ACM

Why an Informatics Degree?

Isn't computer science enough?

Not Seeing the Crime For the Cameras?
From Communications of the ACM

Not Seeing the Crime For the Cameras?

Why it is difficult — but essential — to monitor the effectiveness of security technologies.

From ACM Opinion

A Conversation With Google

Google CEO Eric Schmidt has long defended his company's decision to do business in China despite the restrictions that Beijing imposes on Internet freedom. Nevertheless...

Does Dearth of Info Security Pros Pose Risk?
From ACM TechNews

Does Dearth of Info Security Pros Pose Risk?

Dickie George, the technical director of the U.S. National Security Agency's (NSA's) Information Assurance Directorate, says the shortage of cybersecurity professionals...

Q&A: HP's Running Man
From Communications of the ACM

Q&A: HP's Running Man

Prith Banerjee discusses collaborating with universities, his startup experiences, and Hewlett-Packard Lab's approach to research and development.

The Evolution of Platform Thinking
From Communications of the ACM

The Evolution of Platform Thinking

How platform adoption can be an important determinant of product and technological success.

From ACM Opinion

Connecting with an Internet Pioneer, 40 Years Later

Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...

From ACM Opinion

Connecting with an Internet Pioneer, 40 Years Later

Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...

From ACM CareerNews

Keeping Top Talent in a Down Economy

Now that the economy appears to be in recovery, organizations should be considering ways to retain their top talent and encourage their highest-potential employees...

Conquering the Digital Data Overload
From ACM TechNews

Conquering the Digital Data Overload

University of Utah computer scientist Juliana Freire is working to find data that could be missed in the quagmire of technology available, and to manage and integrate...

From ACM TechNews

Bangalore Blooming Into Innovation Hothouse

Once primarily a place for outsourcing call centers and repetitive software development, Bangalore is now home to a thriving research and development (R&D) industry...

Broken Builds
From Communications of the ACM

Broken Builds

Frequent broken builds could be symptomatic of deeper problems within a development project.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account