Sign In

Communications of the ACM

Recent Articles



Where Should Your IT Constraint Be?
From Communications of the ACM

Where Should Your IT Constraint Be?: The Case of the Financial Services Industry

Locating the strategic location of the IT junction constraint.

Using Data and Respecting Users
From Communications of the ACM

Using Data and Respecting Users

Three technical and legal approaches that create value from data and foster user trust.

Digital Contact Tracing May Protect Privacy, But It Is Unlikely to Stop the Pandemic
From Communications of the ACM

Digital Contact Tracing May Protect Privacy, But It Is Unlikely to Stop the Pandemic

Considering the potential benefits versus the risks of privacy-enhancing technologies.

The Unreasonable Effectiveness of the Julia Programming Language
From ACM Opinion

The Unreasonable Effectiveness of the Julia Programming Language

Fortran has ruled scientific computing, but Julia emerged for large-scale numerical work.

The Man Who Carried Computer Science on His Shoulders
From ACM Opinion

The Man Who Carried Computer Science on His Shoulders

Edsger Wybe Dijkstra's work and ideas shaped the emerging field of computer science like few others.

A Holistic View of Future Risks
From Communications of the ACM

A Holistic View of Future Risks

Almost everything is somehow interrelated with everything else—and that should not surprise us.

Sanity vs. Invisible Markings
From Communications of the ACM

Sanity vs. Invisible Markings

Tabs vs. spaces

The Future of American Industry Depends on Open Source Tech
From ACM Opinion

The Future of American Industry Depends on Open Source Tech

 Open source has two important, and somewhat counterintuitive, advantages: speed and security.

Integrating Management Science Into the HPC Research Ecosystem
From Communications of the ACM

Integrating Management Science Into the HPC Research Ecosystem

How management science benefits from High Performance Computing.

Avalanches Make Us All Innovators
From Communications of the ACM

Avalanches Make Us All Innovators

Avalanches generate enormous breakdowns. The practices of innovation adoption may be just what you need to resolve them.

Broken Hearts and Coffee Mugs
From Communications of the ACM

Broken Hearts and Coffee Mugs

The ordeal of security reviews.

Thorny Problems in Data (-Intensive) Science
From Communications of the ACM

Thorny Problems in Data (-Intensive) Science

Data scientists face challenges spanning academic and non-academic institutions.

Formal Methods as a Path to Better Cybersecurity
From ACM Opinion

Formal Methods as a Path to Better Cybersecurity

Any piece of software should be able to provide the desired features, and when errors do occur, the software should handle them gracefully.

Call For a Wake Standard for Artificial Intelligence
From Communications of the ACM

Call For a Wake Standard for Artificial Intelligence

Suggesting a Voice Name System (VNS) to talk to any object in the world.

For Impactful Community Engagement
From Communications of the ACM

For Impactful Community Engagement: Check Your Role

Toward a more equitable distribution of the benefits of technological change.

Proposal
From Communications of the ACM

Proposal: A Market for Truth to Address False Ads on Social Media

Guaranteeing truth in advertising.

BCS calls for computer coding in scientific research to be more professional
From ACM Opinion

BCS calls for computer coding in scientific research to be more professional

A BCS position paper finds the software coding practices of non-computer-science scientists to be insufficiently professional.

Kode Vicious Plays in Traffic
From Communications of the ACM

Kode Vicious Plays in Traffic

With increasing complexity comes increasing risk.

Technology Adoption
From Communications of the ACM

Technology Adoption

The S-shaped curve of technology adoption is a welcome recurrence in an otherwise chaotic adoption world.

Studying Programming in the Neuroage
From Communications of the ACM

Studying Programming in the Neuroage: Just a Crazy Idea?

Programming research has entered the Neuroage.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account