Sign In

Communications of the ACM

Latest Practice



A Second Conversation with Werner Vogels
From Communications of the ACM

A Second Conversation with Werner Vogels

The Amazon CTO sits with Tom Killalea to discuss designing for evolution at scale.

Out-of-This-World Additive Manufacturing
From Communications of the ACM

Out-of-This-World Additive Manufacturing

From thingamabobs to rockets, 3D printing takes many forms.

Differential Privacy
From Communications of the ACM

Differential Privacy: The Pursuit of Protections by Default

A discussion with Miguel Guevara, Damien Desfontaines, Jim Waldo, and Terry Coatta

The Time I Stole $10,000 from Bell Labs
From Communications of the ACM

The Time I Stole $10,000 from Bell Labs

Why DevOps encourages us to celebrate outages.

The Identity in Everyone's Pocket
From Communications of the ACM

The Identity in Everyone's Pocket

Keeping users secure through their smartphones.

The Die is Cast
From Communications of the ACM

The Die is Cast

Hardware security is not assured.

Security Analysis of SMS as a Second Factor of Authentication
From Communications of the ACM

Security Analysis of SMS as a Second Factor of Authentication

The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping.

The Life of a Data Byte
From Communications of the ACM

The Life of a Data Byte

Be kind and rewind.

Five Nonobvious Remote Work Techniques
From Communications of the ACM

Five Nonobvious Remote Work Techniques

Emulating the efficiency of in-person conversations.

Data on the Outside versus Data on the Inside
From Communications of the ACM

Data on the Outside versus Data on the Inside

Data kept outside SQL has different characteristics from data kept inside.

The History, Status, and Future of FPGAs
From Communications of the ACM

The History, Status, and Future of FPGAs

Hitting a nerve with field-programmable gate arrays.

Debugging Incidents in Google's Distributed Systems
From Communications of the ACM

Debugging Incidents in Google's Distributed Systems

How experts debug production issues in complex distributed systems.

Dark Patterns
From Communications of the ACM

Dark Patterns: Past, Present, and Future

The evolution of tricky user interfaces.

Is Persistent Memory Persistent?
From Communications of the ACM

Is Persistent Memory Persistent?

A simple and inexpensive test of failure-atomic update mechanisms.

To Catch a Failure
From Communications of the ACM

To Catch a Failure: The Record-and-Replay Approach to Debugging

A discussion with Robert O'Callahan, Kyle Huey, Devon O'Dell, and Terry Coatta.

Power to the People
From Communications of the ACM

Power to the People

Reducing datacenter carbon footprints.

The Best Place to Build a Subway
From Communications of the ACM

The Best Place to Build a Subway

Building projects despite (and because of) existing complex systems.

Demystifying Stablecoins
From Communications of the ACM

Demystifying Stablecoins

Cryptography meets monetary policy.

Commit to Memory
From Communications of the ACM

Commit to Memory

Chipping away at Moore's Law.

Communicate Using the Numbers 1, 2, 3, and More
From Communications of the ACM

Communicate Using the Numbers 1, 2, 3, and More

Leveraging expectations for better communication.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account