acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Coming African Tsunami of Information Insecurity
From Communications of the ACM

The Coming African Tsunami of Information Insecurity

As the affordability and use of mobile phones in Africa increase, so too will security vulnerabilities.

In the Grip of the New Monopolists
From ACM Opinion

In the Grip of the New Monopolists

Do away with Google? Break up Facebook? We can't imagine life without them—and that's the problem.

The Speed Camera that Doesn't Just Check Your Speed
From ACM News

The Speed Camera that Doesn't Just Check Your Speed

Everyone knows that speed cameras work. They create the discipline of a lissom lady in leather and make sure everyone understands just what the rules are. In fact...

The Day the Internet Threw a Righteous Hissyfit About Copyright And Pie
From ACM Opinion

The Day the Internet Threw a Righteous Hissyfit About Copyright And Pie

So you might have heard a story yesterday about a little magazine called Cooks Source. Up until then, you might never have heard of Cooks Source. But maybe you've...

Google Is Polluting the Internet
From ACM Opinion

Google Is Polluting the Internet

The danger of allowing an advertising company to control the index of human knowledge is too obvious to ignore.

From ACM Opinion

Declare War on Wikileaks

The Pentagon looks defenseless against cyberwarfare.

From Communications of the ACM

In Support of Computer Science Teachers and the CSTA

If we want more computer science students, and if we want computer scientists to be understood for what we are, we must clarify the message about computer science...

Sensor Networks For the Sciences
From Communications of the ACM

Sensor Networks For the Sciences

Lessons from the field derived from developing wireless sensor networks for monitoring active and hazardous volcanoes.

Why Isn't Cyberspace More Secure?
From Communications of the ACM

Why Isn't Cyberspace More Secure?

Evaluating governmental actions—and inactions—toward improving cyber security and addressing future challenges.

Why Do Software Startups Patent (or Not)?
From Communications of the ACM

Why Do Software Startups Patent (or Not)?

Assessing the controversial results of a recent empirical study of the role of intellectual property in software startups.

K-12 Computational Learning
From Communications of the ACM

K-12 Computational Learning

Enhancing student learning and understanding by combining theories of learning with the computer's unique attributes.

­efa President Platini Opposed to Goal-Line Technology
From ACM Opinion

­efa President Platini Opposed to Goal-Line Technology

Uefa president Michel Platini believes goal-line technology would lead to "Playstation football."

From ACM Opinion

Why Telecom Regulation Needs to Change

Research suggests that the approach that worked with a few large companies with aligned interests needs revisiting in the Internet age.

Score: Agile Research Group Management
From Communications of the ACM

Score: Agile Research Group Management

Adapting agile software development methodology toward more efficient management of academic research groups.

Version Aversion
From Communications of the ACM

Version Aversion

The way you number your releases communicates more than you might think.

Victorian Data Processing
From Communications of the ACM

Victorian Data Processing

The Victorian world was awash with data and with organizations that processed it; and they usually used nothing...

Friends Without Benefits
From ACM Opinion

Friends Without Benefits

The Valley used to be a place run by scientists and engineers, people like Robert Noyce, the Ph.D. physicist who helped invent the integrated circuit and cofounded...

From ACM Opinion

The Anthropology of Hackers

A "hacker" is a technologist with a love for computing and a "hack" is a clever technical solution arrived through a non-obvious means. It doesn't mean to compromise...

From ACM Opinion

Robots vs. Suicide Terrorists

In February 2008, a pair of suicide bombers struck the Israeli town of Dimona. One of the attackers detonated his explosive vest, killing an Israeli, and injuring...

Ban Drone-Porn War Crimes
From ACM Opinion

Ban Drone-Porn War Crimes

Death by joystick is immoral and illegal.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account