Microsoft’s Protocol Documentation Program: Interoperability Testing at Scale
Practice
If You Have Too Much Data, Then ‘Good Enough’ Is Good Enough
Does Deterrence Work in Reducing Information Security Policy Abuse By Employees?
Mobile Application Development: Web vs. Native
Returning Control to the Programmer: SIMD Intrinsics For Virtual Machines
A Co-Relational Model of Data For Large Shared Data Banks
Testable System Administration
National Internet Defense – Small States on the Skirmish Line
B.Y.O.C (1,342 Times and Counting)
Finding Usability Bugs with Automated Tests
A Plea from Sysadmins to Software Vendors: 10 Do's and Don'ts
System Administration Soft Skills
Virtualization: Blessing or Curse?
Collaboration in System Administration
UX Design and Agile: A Natural Fit?
The Theft of Business Innovation: An ACM-BCS Roundtable on Threats to Global Competitiveness
A Conversation with Ed Catmull
Sir, Please Step Away from the ASR-33!
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More