acm-header
Sign In

Communications of the ACM

Latest Practice



The Science of Managing Data Science
From Communications of the ACM

The Science of Managing Data Science

Lessons learned managing a data science research team.

Parallel Processing with <code>Promises</code>
From Communications of the ACM

Parallel Processing with Promises

A simple method of writing a collaborative system.

Go Static or Go Home
From Communications of the ACM

Go Static or Go Home

In the end, dynamic systems are simply less secure.

Securing Network Time Protocol
From Communications of the ACM

Securing Network Time Protocol

Crackers discover how to use NTP as a weapon for abuse.

Internal Access Controls
From Communications of the ACM

Internal Access Controls

Trust, but verify.

The Responsive Enterprise
From Communications of the ACM

The Responsive Enterprise: Embracing the Hacker Way

Soon every company will be a software company.

Evolution of the Product Manager
From Communications of the ACM

Evolution of the Product Manager

Better education needed to develop the discipline.

Certificate Transparency
From Communications of the ACM

Certificate Transparency

Public, verifiable, append-only logs.

Security Collapse in the HTTPS Market
From Communications of the ACM

Security Collapse in the HTTPS Market

Assessing legal and technical solutions to secure HTTPS.

Privacy, Anonymity, and Big Data in the Social Sciences
From Communications of the ACM

Privacy, Anonymity, and Big Data in the Social Sciences

Quality social science research and the privacy of human subjects require trust.

Bringing Arbitrary Compute to Authoritative Data
From Communications of the ACM

Bringing Arbitrary Compute to Authoritative Data

Many disparate use cases can be satisfied with a single storage system.

Quality Software Costs Money - Heartbleed Was Free
From Communications of the ACM

Quality Software Costs Money - Heartbleed Was Free

How to generate funding for free and open source software.

Who Must You Trust?
From Communications of the ACM

Who Must You Trust?

You must have some trust if you want to get anything done.

Automated QA Testing at Electronic Arts
From Communications of the ACM

Automated QA Testing at Electronic Arts

A discussion with Michael Donat, Jafar Husain, and Terry Coatta

The NSA and Snowden
From Communications of the ACM

The NSA and Snowden: Securing the All-Seeing Eye

How good security at the NSA could have stopped him.

A Primer on Provenance
From Communications of the ACM

A Primer on Provenance

Better understanding data requires tracking its history and context.

Don't Settle For Eventual Consistency
From Communications of the ACM

Don't Settle For Eventual Consistency

Stronger properties for low-latency geo-replicated storage.

Scaling Existing Lock-Based Applications with Lock Elision
From Communications of the ACM

Scaling Existing Lock-Based Applications with Lock Elision

Enabling existing lock-based programs to achieve performance benefits of nonblocking synchronization.

The API Performance Contract
From Communications of the ACM

The API Performance Contract

How can the expected interactions between caller and implementation be guaranteed?

Eventually Consistent
From Communications of the ACM

Eventually Consistent: Not What You Were Expecting?

Methods of quantifying consistency (or lack thereof) in eventually consistent storage systems.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account