Sign In

Communications of the ACM

Recent Opinion



Q&A: Our Dame Commander
From Communications of the ACM

Q&A: Our Dame Commander

Wendy Hall discusses her plans to increase ACM's membership and to create task forces in China, India, and Europe.

From ACM TechNews

Information Architect Alex Wright Talks About the Lessons of It History

New York Times information architect Alex Wright says in an interview that there is a tendency to concentrate on information technology's future at the expenseView...

The A-Z of Programming Languages: Bourne Shell, or Sh
From ACM TechNews

The A-Z of Programming Languages: Bourne Shell, or Sh

Steve Bourne, creator of the Bourne shell or sh programming language, says in an interview that the language aimed to remedy the problem of designing the shellView...

The Grill: Jeannette M. Wing on the Hot Seat
From ACM TechNews

The Grill: Jeannette M. Wing on the Hot Seat

Carnegie Mellon University professor Jeannette M. Wing is an expert on computational thinking, the discipline of applying computer science's problem-solving methods...

An Interview With C.A.R. Hoare
From Communications of the ACM

An Interview With C.A.R. Hoare

C.A.R. Hoare, developer of the Quicksort algorithm and a lifelong contributor to the theory and design of programming languages, discusses the practical application...

Is Software Engineering Engineering?
From Communications of the ACM

Is Software Engineering Engineering?

Software engineering continues to be dogged by claims it is not engineering. Adopting a computer-systems view that embraces hardware, software, and user environment...

Point/Counterpoint: Network Neutrality Nuances
From Communications of the ACM

Point/Counterpoint: Network Neutrality Nuances

A discussion of divergent paths to unrestricted access of content and applications via the Internet.

International Communications Tapped For Intelligence-Gathering
From Communications of the ACM

International Communications Tapped For Intelligence-Gathering

Governments concerned with national-security threats use the Internet to gather intelligence from communications traffic that transits local facilities. This surveillance...

Economic and Business Dimensions: The Extent of Globalization of Software Innovation
From Communications of the ACM

Economic and Business Dimensions: The Extent of Globalization of Software Innovation

Will the software development laboratories follow the production mills?

From Communications of the ACM

Why Ebay Lost to Taobao in China: The Glocal Advantage

How Consumer-to-Consumer (C2C) electronic-commerce platforms in China compete and how buyers are stimulated to be both aware and trustful of sellers through buyer...

Technology Strategy and Management: The Legacy of Bill Gates
From Communications of the ACM

Technology Strategy and Management: The Legacy of Bill Gates

Assessing the pluses and minuses of the helmsmanship of Microsoft Corporation since its inception.

The Business of Software: The Ontology of Paper
From Communications of the ACM

The Business of Software: The Ontology of Paper

The next generation of software engineering will involve designing systems without using paper-based formats, instead using software to develop software.

Ground Control to Architect Tom . . .
From Communications of the ACM

Ground Control to Architect Tom . . .

Architecture astronauts habitually speak at extremely high levels of abstraction to avoid engaging in tangible discussions that might lead to disclosing that they...

Law and Technology: The End of the Generative Internet
From Communications of the ACM

Law and Technology: The End of the Generative Internet

Exploring the expectations and implications for version 2.0 of the Net's new gated communities.

How Are We Doing?
From Communications of the ACM

How Are We Doing?

A rabbinical story tells about an angry reader who stormed into a newspaper office waving the day's paper, asking to see the editor of the obituary column.

Kode Vicious: Permanence and Change
From Communications of the ACM

Kode Vicious: Permanence and Change

Highlighting the importance of doing one's best in view of code longevity and the impermanence of the changineer.

CTO Virtualization Roundtable
From Communications of the ACM

CTO Virtualization Roundtable: Part II

When it comes to virtualization platforms, experts say focus first on the services to be delivered.

CTO Virtualization Roundtable
From Communications of the ACM

CTO Virtualization Roundtable: Part II

When it comes to virtualization platforms, experts say focus first on the services to be delivered.

Database Dialogue with Pat Selinger
From Communications of the ACM

Database Dialogue with Pat Selinger

Relational database pioneer Patricia G. Selinger explores the vast realm of database technology and trends in a wide-ranging discussion with Microsoft's James Hamilton...

Database Dialogue with Pat Selinger
From Communications of the ACM

Database Dialogue with Pat Selinger

Relational database pioneer Patricia G. Selinger explores the vast realm of database technology and trends in a wide-ranging discussion with Microsoft's James Hamilton...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account