acm-header
Sign In

Communications of the ACM

Latest Practice



Security Collapse in the HTTPS Market
From Communications of the ACM

Security Collapse in the HTTPS Market

Assessing legal and technical solutions to secure HTTPS.

Why Is It Taking So Long to Secure Internet Routing?
From Communications of the ACM

Why Is It Taking So Long to Secure Internet Routing?

Routing security incidents can still slip past deployed security defenses.

Privacy, Anonymity, and Big Data in the Social Sciences
From Communications of the ACM

Privacy, Anonymity, and Big Data in the Social Sciences

Quality social science research and the privacy of human subjects require trust.

The Network Is Reliable
From Communications of the ACM

The Network Is Reliable

An informal survey of real-world communications failures.

Securing the Tangled Web
From Communications of the ACM

Securing the Tangled Web

Preventing script injection vulnerabilities through software design.

Bringing Arbitrary Compute to Authoritative Data
From Communications of the ACM

Bringing Arbitrary Compute to Authoritative Data

Many disparate use cases can be satisfied with a single storage system.

Quality Software Costs Money - Heartbleed Was Free
From Communications of the ACM

Quality Software Costs Money - Heartbleed Was Free

How to generate funding for free and open source software.

Undergraduate Software Engineering
From Communications of the ACM

Undergraduate Software Engineering

Addressing the needs of professional software development.

Who Must You Trust?
From Communications of the ACM

Who Must You Trust?

You must have some trust if you want to get anything done.

Automated QA Testing at Electronic Arts
From Communications of the ACM

Automated QA Testing at Electronic Arts

A discussion with Michael Donat, Jafar Husain, and Terry Coatta

The NSA and Snowden
From Communications of the ACM

The NSA and Snowden: Securing the All-Seeing Eye

How good security at the NSA could have stopped him.

A Primer on Provenance
From Communications of the ACM

A Primer on Provenance

Better understanding data requires tracking its history and context.

Don't Settle For Eventual Consistency
From Communications of the ACM

Don't Settle For Eventual Consistency

Stronger properties for low-latency geo-replicated storage.

Rate-Limiting State
From Communications of the ACM

Rate-Limiting State

The edge of the Internet is an unruly place.

Multipath TCP
From Communications of the ACM

Multipath TCP

Decoupled from IP, TCP is at last able to support multihomed hosts.

Eventually Consistent
From Communications of the ACM

Eventually Consistent: Not What You Were Expecting?

Methods of quantifying consistency (or lack thereof) in eventually consistent storage systems.

Center Wheel For Success
From Communications of the ACM

Center Wheel For Success

"Not invented here" syndrome is not unique to the IT world.

Provenance in Sensor Data Management
From Communications of the ACM

Provenance in Sensor Data Management

A cohesive, independent solution for bringing provenance to scientific research.

Toward Software-Defined SLAs
From Communications of the ACM

Toward Software-Defined SLAs

Enterprise computing in the public cloud.

Making the Web Faster with HTTP 2.0
From Communications of the ACM

Making the Web Faster with HTTP 2.0

HTTP continues to evolve.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account