Sign In

Communications of the ACM

Recent Opinion



Journals For Certification, Conferences For Rapid Dissemination
From Communications of the ACM

Journals For Certification, Conferences For Rapid Dissemination

The publication culture in computer science is different. Whereas other disciplines focus on journal publication, the standard practice...

Storage Strife
From Communications of the ACM

Storage Strife

Beware keeping data in binary format.

As Simple As Possible – But Not More So
From Communications of the ACM

As Simple As Possible – But Not More So

An assessment of the U.S. government's EINSTEIN project.

From Interests to Values
From Communications of the ACM

From Interests to Values

Computer science is not that difficult but wanting to learn it is.

Geography Is Alive and Well in Virtual Teams
From Communications of the ACM

Geography Is Alive and Well in Virtual Teams

Just because a team is virtual, it doesn't mean geography is dead.

Ted's Chris Anderson: The Man Who Made Youtube Clever
From ACM Opinion

Ted's Chris Anderson: The Man Who Made Youtube Clever

With his TED Talks series, the former magazine mogul Chris Anderson has racked up 500 million web video views for speeches by academics and technological experts...

South Korea's School Tablets a Test For Other Countries
From ACM Opinion

South Korea's School Tablets a Test For Other Countries

South Korea will ban school paper textbooks and replace them with electronic tablets by 2014, which should alarm other nations.  South Korea's students ranked No...

Non-Myths About Programming
From Communications of the ACM

Non-Myths About Programming

Viewing computer science in a broader context to dispel common misperceptions and provide more accurate guidance to students who are...

The Status of Women of Color in Computer Science
From Communications of the ACM

The Status of Women of Color in Computer Science

Addressing the challenges of increasing the number of women of color in computing and ensuring their success.

Too Many Copyrights?
From Communications of the ACM

Too Many Copyrights?

Reinstituting formalities — notice of copyright claims and registration requirements — could help address problems related to too many copyrights that last for...

Values in Design
From Communications of the ACM

Values in Design

Focusing on socio-technical design with values as a critical component in the design process.

Driving Power in Global Supply Chains
From Communications of the ACM

Driving Power in Global Supply Chains

Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...

From ACM Opinion

How I Failed, Failed, and Finally Succeeded at Learning How to Code

When Colin Hughes was about 11 years old his parents brought home a rather strange toy. It wasn't colorful or cartoonish; it didn't seem to have any lasers or...

Making the Case For Security
From ACM News

Making the Case For Security

Major corporations have made serious mistakes with information security recently, resulting in spectacular failures to protect business and customer records....

The STEM (aka "smarty Pants") Conundrum
From ACM Opinion

The STEM (aka "smarty Pants") Conundrum

The promotion of science and math degrees is hampered by the impression that only the smartest of the smart can obtain them. What can educators do to make STEM's...

Computer Science Can ­Use More Science
From Communications of the ACM

Computer Science Can ­Use More Science

Software developers should use empirical methods to analyze their designs to predict how working systems will behave.

The Risks of Stopping Too Soon
From Communications of the ACM

The Risks of Stopping Too Soon

Good software design is never easy, but stopping too soon makes the job more difficult.

Practical Application of Theoretical Estimation
From Communications of the ACM

Practical Application of Theoretical Estimation

One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...

Who Are We – Now?
From Communications of the ACM

Who Are We – Now?

Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.

Identity Management and Privacy
From Communications of the ACM

Identity Management and Privacy: A Rare Opportunity To Get It Right

The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account