acm-header
Sign In

Communications of the ACM

Latest Practice



Mapping the Privacy Landscape for Central Bank Digital Currencies
From Communications of the ACM

Mapping the Privacy Landscape for Central Bank Digital Currencies

Now is the time to shape what future payment flows will reveal about you.

Split Your Overwhelmed Teams
From Communications of the ACM

Split Your Overwhelmed Teams

Two teams of five is not the same as one team of 10.

From Zero to 100
From Communications of the ACM

From Zero to 100

Demystifying zero trust and its implications on enterprise people, process, and technology.

The Arrival of Zero Trust
From Communications of the ACM

The Arrival of Zero Trust: What Does it Mean?

A discussion of zero-trust enterprise efforts in cybersecurity.

CSRB's Opus One
From Communications of the ACM

CSRB's Opus One

Comments on the Cyber Safety Review Board Log4j Event Report.

Walk a Mile in Their Shoes
From Communications of the ACM

Walk a Mile in Their Shoes

The COVID-19 pandemic through the lens of four tech workers.

Linear Address Spaces
From Communications of the ACM

Linear Address Spaces

Unsafe at any speed.

FPGAs in Client Compute Hardware
From Communications of the ACM

FPGAs in Client Compute Hardware

Despite certain challenges, FPGAs provide security and performance benefits over ASICs.

The Keys to the Kingdom
From Communications of the ACM

The Keys to the Kingdom

A deleted private key, a looming deadline, and a last chance to patch a new static root of trust into the bootloader.

Surveillance Too Cheap to Meter
From Communications of the ACM

Surveillance Too Cheap to Meter

Stopping Big Brother would require an expensive overhaul of the entire system.

The Software Industry Is <i>Still</i> the Problem
From Communications of the ACM

The Software Industry Is Still the Problem

The time is (also) way overdue for IT professional liability.

Lamboozling Attackers
From Communications of the ACM

Lamboozling Attackers: A New Generation of Deception

Software engineering teams can exploit attackers' human nature by building deception environments.

Federated Learning and Privacy
From Communications of the ACM

Federated Learning and Privacy

Building privacy-preserving systems for machine learning and data science on decentralized data.

Static Analysis at GitHub
From Communications of the ACM

Static Analysis at GitHub

An experience report.

Designing UIs for Static-Analysis Tools
From Communications of the ACM

Designing UIs for Static-Analysis Tools

Evaluating tool design guidelines with SWAN.

The Complex Path to Quantum Resistance
From Communications of the ACM

The Complex Path to Quantum Resistance

Is your organization prepared?

Quantum-Safe Trust for Vehicles
From Communications of the ACM

Quantum-Safe Trust for Vehicles: The Race Is Already On

A discussion of concerns on quantum vulnerability for the automobile industry.

WebRTC
From Communications of the ACM

WebRTC: Real-Time Communication for the Open Web Platform

What was once a way to bring audio and video to the Web has expanded into more use cases than we could ever imagine.

Application Frameworks
From Communications of the ACM

Application Frameworks

While powerful, frameworks are not for everyone.

The SPACE of Developer Productivity
From Communications of the ACM

The SPACE of Developer Productivity

There's more to it than you think.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account