acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Driving Power in Global Supply Chains
From Communications of the ACM

Driving Power in Global Supply Chains

Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...

In 'cars 2,' John Lasseter Says Big Oil Is the 'uber Bad Guy'
From ACM Opinion

In 'cars 2,' John Lasseter Says Big Oil Is the 'uber Bad Guy'

"Cars 2" director John Lasseter talked with The Wall Street Journal in his office at the Emeryville headquarters of Pixar Animation Studios, where he is chief...

Sony's Kaz Hirai on the Psn Hack
From ACM News

Sony's Kaz Hirai on the Psn Hack

Sony's deputy president about the PlayStation Network hack, PS Vita and PS3's enduring appeal.

A Day With John Lasseter, King of Pixar
From ACM Opinion

A Day With John Lasseter, King of Pixar

In today's hyper-networked world, where anyone can reach anybody at any time, John Lasseter is something of an anachronism. Though he is routinely armed with...

Computer Science Can Use More Science
From Communications of the ACM

Computer Science Can Use More Science

Software developers should use empirical methods to analyze their designs to predict how working systems will behave.

The Risks of Stopping Too Soon
From Communications of the ACM

The Risks of Stopping Too Soon

Good software design is never easy, but stopping too soon makes the job more difficult.

Practical Application of Theoretical Estimation
From Communications of the ACM

Practical Application of Theoretical Estimation

One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...

Who Are We - Now?
From Communications of the ACM

Who Are We - Now?

Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.

Identity Management and Privacy
From Communications of the ACM

Identity Management and Privacy: A Rare Opportunity To Get It Right

The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...

There's No Data Sheriff on the Wild Web
From ACM Opinion

There's No Data Sheriff on the Wild Web

A company suffers a catastrophic attack on its servers. Gone are names, email addresses, home phone numbers, passwords, credit card numbers. Everything ends up...

From ACM Opinion

Five Gadgets that Will Be Dead in Five Years

If there's one thing that's predictable in the technology world, it's that things change. Products that were commonplace 10 years ago (PDAs, CRT televisions,...

Why Far Fewer Bettors Pony ­p on the Horses
From ACM Opinion

Why Far Fewer Bettors Pony ­p on the Horses

Horse bettor John Astarita have plenty of explanations why horse racing revenue is on the decline. One complaint concerns deep-pocket investors who use computer...

Customers Had More Faith in Sony Than It Deserved
From ACM News

Customers Had More Faith in Sony Than It Deserved

In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services...

Sorry But the Game Does Not Build Anymore
From ACM Opinion

Sorry But the Game Does Not Build Anymore

Continuous integration and an automated asset pipeline should guarantee that you can produce an up-to-date working version of the game you are working on in very...

From ACM Opinion

Video Game Shapes Leadership Style of the New Head of Mit's Media Lab

Joi Ito has a knack for leading people, which he demonstrated, of all places, in World of Warcraft.

An Interview with Steve Furber
From Communications of the ACM

An Interview with Steve Furber

Steve Furber, designer of the seminal BBC Microcomputer System and the widely used ARM microprocessor, reflects on his career.

Bell Labs and Centralized Innovation
From Communications of the ACM

Bell Labs and Centralized Innovation

In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...

Reaching Learners Beyond Our Hallowed Halls
From Communications of the ACM

Reaching Learners Beyond Our Hallowed Halls

Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.

Online Advertising, Behavioral Targeting, and Privacy
From Communications of the ACM

Online Advertising, Behavioral Targeting, and Privacy

Studying how privacy regulation might impact economic activity on the advertising-supported Internet.

In the Digital Era Free Is Easy, So How Do You Persuade People to Pay?
From ACM Opinion

In the Digital Era Free Is Easy, So How Do You Persuade People to Pay?

To compete with piracy, content providers need clear value propositions that don't conflict with the product.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account