Sign In

Communications of the ACM

Recent Articles



­Usable Security: How to Get It
From Communications of the ACM

­Usable Security: How to Get It

Why does your computer bother you so much about security, but still isn't secure? It's because users don't have a model for security, or a simple way to keep important...

Inducing Innovation With Prizes
From ACM TechNews

Inducing Innovation With Prizes

The successful completion of the Netflix Prize competition demonstrates that prizes are a viable mechanism for encouraging research in the computing fields, writes...

Retrospective: An Axiomatic Basis For Computer Programming
From Communications of the ACM

Retrospective: An Axiomatic Basis For Computer Programming

C.A.R. Hoare revisits his past Communications article on the axiomatic approach to programming and uses it as a touchstone for the future.

Kode Reviews 101
From Communications of the ACM

Kode Reviews 101

A review of code review do's and don'ts.

Dealing with the Venture Capital Crisis
From Communications of the ACM

Dealing with the Venture Capital Crisis

The venture capital industry, like financial services in general, has fallen on hard times. Part of the problem is that large payoffs...

Reflections on Conficker
From Communications of the ACM

Reflections on Conficker

Conficker's alarming growth rate in early 2009 along with the apparent mystery surrounding its ultimate purpose had raised concern among...

Computing in the Depression Era
From Communications of the ACM

Computing in the Depression Era

Since its beginning, the computer industry has been through several major recessions, each occurring  approximately five years...

Contagious Craziness, Spreading Sanity
From Communications of the ACM

Contagious Craziness, Spreading Sanity

Some examples of the upward or downward spiral of behaviors in the workplace.

The A-Z of Programming Languages: Groovy
From ACM TechNews

The A-Z of Programming Languages: Groovy

Groovy project manager Guillaume Laforge says the Groovy programming language was designed to make life simpler for developers through its seamless integration...

Actually, Obama Doesn't Want to Take Over The Internet
From ACM Opinion

Actually, Obama Doesn't Want to Take Over The Internet

A number of people are up in arms about a new bill going through the U.S. Senate that allows President Obama to "take over private networks." Oh no! That would...

An Interview with Maurice Wilkes
From Communications of the ACM

An Interview with Maurice Wilkes

Maurice Wilkes, the designer and builder of the EDSAC, passed away on Nov. 29 at age 97. He reflects on his career in this 2009 interview.

The Long Road to Computer Science Education Reform
From Communications of the ACM

The Long Road to Computer Science Education Reform

Viewing the factors impeding improvements to CS education from kindergarten through grade 12 from a policy perspective.

How ICT Advances Might Help Developing Nations
From Communications of the ACM

How ICT Advances Might Help Developing Nations

Some predictions for technology developments, deployments, and the associated societal implications.

Computing: The Fourth Great Domain of Science
From Communications of the ACM

Computing: The Fourth Great Domain of Science

Computing is as fundamental as the physical, life, and social sciences.

Keeping Track of Telecommunications Surveillance
From Communications of the ACM

Keeping Track of Telecommunications Surveillance

The creation of a statistical index of U.S. telecommunications surveillance activities and their results will benefit both civil liberties and law enforcement.

From ACM Opinion

Science Labs Don't Have to Cost an Arm and a Leg

A recent article in District Administration magazine discusses the aging science labs in schools across the United States and the cost of upgrading them all. The...

Viewpoint: Time For Computer Science to Grow U­p
From Communications of the ACM

Viewpoint: Time For Computer Science to Grow U­p

As the computer science field has evolved, so should the methods for disseminating computing research results.

Privacy and Security: An Ethics Code For ­U.S. Intelligence Officers
From Communications of the ACM

Privacy and Security: An Ethics Code For ­U.S. Intelligence Officers

Debating and arguing the points of a proposed code of behavior to provide guidance in making choices can produce the most effective ethics training.

Education: Alice 3
From Communications of the ACM

Education: Alice 3: Concrete to Abstract

The innovative Alice 3 programming environment, currently in beta testing, teaches students to program with Alice and Java software.

Economic and Business Dimensions: Entrepreneurship During a Slump
From Communications of the ACM

Economic and Business Dimensions: Entrepreneurship During a Slump

A contrarian's perspective on how entrepreneurial opportunities and innovation can thrive during an economic crisis.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account