Sign In

Communications of the ACM

Recent Opinion



Values in Design
From Communications of the ACM

Values in Design

Focusing on socio-technical design with values as a critical component in the design process.

Driving Power in Global Supply Chains
From Communications of the ACM

Driving Power in Global Supply Chains

Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...

From ACM Opinion

How I Failed, Failed, and Finally Succeeded at Learning How to Code

When Colin Hughes was about 11 years old his parents brought home a rather strange toy. It wasn't colorful or cartoonish; it didn't seem to have any lasers or...

Making the Case For Security
From ACM News

Making the Case For Security

Major corporations have made serious mistakes with information security recently, resulting in spectacular failures to protect business and customer records....

The STEM (aka "smarty Pants") Conundrum
From ACM Opinion

The STEM (aka "smarty Pants") Conundrum

The promotion of science and math degrees is hampered by the impression that only the smartest of the smart can obtain them. What can educators do to make STEM's...

Computer Science Can Use More Science
From Communications of the ACM

Computer Science Can Use More Science

Software developers should use empirical methods to analyze their designs to predict how working systems will behave.

The Risks of Stopping Too Soon
From Communications of the ACM

The Risks of Stopping Too Soon

Good software design is never easy, but stopping too soon makes the job more difficult.

Practical Application of Theoretical Estimation
From Communications of the ACM

Practical Application of Theoretical Estimation

One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...

Who Are We - Now?
From Communications of the ACM

Who Are We - Now?

Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.

Identity Management and Privacy
From Communications of the ACM

Identity Management and Privacy: A Rare Opportunity To Get It Right

The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...

Open Science: A Future Shaped By Shared Experience
From ACM Opinion

Open Science: A Future Shaped By Shared Experience

Mapping the human genome showed how the Internet can play a vital part in collective scientific research. Now more scientists are collaborating—and inviting amateurs...

From ACM Opinion

Let in the Super-Immigrants!

The best way to improve the U.S. economy fast is to poach entrepreneurs from the rest of the world. So why do we make it so difficult for them to immigrate?

Sputnik Helped Launch Career of Professor
From ACM Opinion

Sputnik Helped Launch Career of Professor

The Soviet Union's 1957 launch of Sputnik, the first man-made satellite to orbit Earth, had a profound impact on American higher education, and drove Andrew Romberger...

Sputnik Helped Launch Career of Professor
From ACM Opinion

Sputnik Helped Launch Career of Professor

The Soviet Union's 1957 launch of Sputnik, the first man-made satellite to orbit Earth, had a profound impact on American higher education, and drove Andrew Romberger...

From ACM Opinion

Video Game Shapes Leadership Style of the New Head of Mit's Media Lab

Joi Ito has a knack for leading people, which he demonstrated, of all places, in World of Warcraft.

The Importance of Reviewing the Code
From Communications of the ACM

The Importance of Reviewing the Code

Highlighting the significance of the often overlooked underlying software used to produce research results.

Bell Labs and Centralized Innovation
From Communications of the ACM

Bell Labs and Centralized Innovation

In early 1935, a man named Clarence Hickman had a secret machine, about six feet tall, standing in his office. Hickman was...

Reaching Learners Beyond Our Hallowed Halls
From Communications of the ACM

Reaching Learners Beyond Our Hallowed Halls

Rethinking the design of computer science courses and broadening the definition of computing education both on and off campus.

Online Advertising, Behavioral Targeting, and Privacy
From Communications of the ACM

Online Advertising, Behavioral Targeting, and Privacy

Studying how privacy regulation might impact economic activity on the advertising-supported Internet.

­biquity Symposium: What Have We Said About Computation?
From ACM Opinion

­biquity Symposium: What Have We Said About Computation?

A recent ACM Ubiquity symposium considered the question: “What is computation?” In this closing article, Ubiquity's editor-in-chief Peter J. Denning shares what...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account