acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

The Continual Re-Creation Of The Key-Value Datastore
From BLOG@CACM

The Continual Re-Creation Of The Key-Value Datastore

The evolution of single machine key-value stores.

Communing on Computing
From BLOG@CACM

Communing on Computing

 Conferences can renew our professional commitment and inspire thought on problems we face.

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid
From BLOG@CACM

5 Often Overlooked Coding Mistakes New Web Developers Need to Avoid

Avoiding these common, easily preventable blunders will help you maximize success in your career journey.

Data Anonymization Using the Random Sum Method
From BLOG@CACM

Data Anonymization Using the Random Sum Method

The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.

Cryptocurs Don't Asportate
From BLOG@CACM

Cryptocurs Don't Asportate

Cryptocurrency on a blockchain cannot be stolen -- it's true.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account