acm-header
Sign In

Communications of the ACM

Latest Practice



When Curation Becomes Creation
From Communications of the ACM

When Curation Becomes Creation

Algorithms, microcontent, and the vanishing distinction between platforms and creators.

Digging into Big Provenance (with SPADE)
From Communications of the ACM

Digging into Big Provenance (with SPADE)

A user interface for querying provenance.

What Went Wrong?
From Communications of the ACM

What Went Wrong?

Why we need an IT accident investigation board.

Software Development in Disruptive Times
From Communications of the ACM

Software Development in Disruptive Times

Creating a software solution with fast decision capability, agile project management, and extreme low-code technology.

A New Era for Mechanical CAD
From Communications of the ACM

A New Era for Mechanical CAD

Time to move forward from decades-old design.

The Complex Path to Quantum Resistance
From Communications of the ACM

The Complex Path to Quantum Resistance

Is your organization prepared?

Quantum-Safe Trust for Vehicles
From Communications of the ACM

Quantum-Safe Trust for Vehicles: The Race Is Already On

A discussion of concerns on quantum vulnerability for the automobile industry.

Biases in AI Systems
From Communications of the ACM

Biases in AI Systems

A survey for practitioners.

WebRTC
From Communications of the ACM

WebRTC: Real-Time Communication for the Open Web Platform

What was once a way to bring audio and video to the Web has expanded into more use cases than we could ever imagine.

Application Frameworks
From Communications of the ACM

Application Frameworks

While powerful, frameworks are not for everyone.

Always-on Time-Series Database
From Communications of the ACM

Always-on Time-Series Database: Keeping Up Where There's No Way to Catch Up

A discussion with Theo Schlossnagle, Justin Sheehy, and Chris McCubbin.

The SPACE of Developer Productivity
From Communications of the ACM

The SPACE of Developer Productivity

There's more to it than you think.

Toward Confidential Cloud Computing
From Communications of the ACM

Toward Confidential Cloud Computing

Extending hardware-enforced cryptographic protection to data while in use.

Enclaves in the Clouds
From Communications of the ACM

Enclaves in the Clouds

Legal considerations and broader implications

Battery Day
From Communications of the ACM

Battery Day

A closer look at the technology that makes portable electronics possible.

Everything VPN Is New Again
From Communications of the ACM

Everything VPN Is New Again

The 24-year-old security model has found a second wind.

A Second Conversation with Werner Vogels
From Communications of the ACM

A Second Conversation with Werner Vogels

The Amazon CTO sits with Tom Killalea to discuss designing for evolution at scale.

Out-of-This-World Additive Manufacturing
From Communications of the ACM

Out-of-This-World Additive Manufacturing

From thingamabobs to rockets, 3D printing takes many forms.

Differential Privacy
From Communications of the ACM

Differential Privacy: The Pursuit of Protections by Default

A discussion with Miguel Guevara, Damien Desfontaines, Jim Waldo, and Terry Coatta

The Time I Stole $10,000 from Bell Labs
From Communications of the ACM

The Time I Stole $10,000 from Bell Labs

Why DevOps encourages us to celebrate outages.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account