acm-header
Sign In

Communications of the ACM

Latest Practice



From Zero to 100
From Communications of the ACM

From Zero to 100

Demystifying zero trust and its implications on enterprise people, process, and technology.

The Arrival of Zero Trust
From Communications of the ACM

The Arrival of Zero Trust: What Does it Mean?

A discussion of zero-trust enterprise efforts in cybersecurity.

Distributed Latency Profiling through Critical Path Tracing
From Communications of the ACM

Distributed Latency Profiling through Critical Path Tracing

CPT can provide actionable and precise latency analysis.

Research for Practice: Crash Consistency
From Communications of the ACM

Research for Practice: Crash Consistency

Keeping data safe in the presence of crashes is a fundamental problem.

FHIR
From Communications of the ACM

FHIR: Reducing Friction in the Exchange of Healthcare Data

A discussion with James Agnew, Pat Helland, and Adam Cole.

CSRB's Opus One
From Communications of the ACM

CSRB's Opus One

Comments on the Cyber Safety Review Board Log4j Event Report.

Research for Practice: Convergence
From Communications of the ACM

Research for Practice: Convergence

The return of a popular feature that shares the joy and utility of reading CS research between academics and their counterparts in industry.

Walk a Mile in Their Shoes
From Communications of the ACM

Walk a Mile in Their Shoes

The COVID-19 pandemic through the lens of four tech workers.

Linear Address Spaces
From Communications of the ACM

Linear Address Spaces

Unsafe at any speed.

Middleware 101
From Communications of the ACM

Middleware 101

What to know now and for the future.

Persistence Programming
From Communications of the ACM

Persistence Programming

Are we doing this right?

FPGAs in Client Compute Hardware
From Communications of the ACM

FPGAs in Client Compute Hardware

Despite certain challenges, FPGAs provide security and performance benefits over ASICs.

Interpretable Machine Learning
From Communications of the ACM

Interpretable Machine Learning: Moving from Mythos to Diagnostics

A path forward for the ML community to address a stark disconnect.

The Keys to the Kingdom
From Communications of the ACM

The Keys to the Kingdom

A deleted private key, a looming deadline, and a last chance to patch a new static root of trust into the bootloader.

Surveillance Too Cheap to Meter
From Communications of the ACM

Surveillance Too Cheap to Meter

Stopping Big Brother would require an expensive overhaul of the entire system.

The Software Industry Is <i>Still</i> the Problem
From Communications of the ACM

The Software Industry Is Still the Problem

The time is (also) way overdue for IT professional liability.

Lamboozling Attackers
From Communications of the ACM

Lamboozling Attackers: A New Generation of Deception

Software engineering teams can exploit attackers' human nature by building deception environments.

It Takes a Community
From Communications of the ACM

It Takes a Community: The Open Source Challenge

A discussion with Reynold Xin, Wes McKinney, Alan Gates, and Chris McCubbin.

Meaning and Context in Computer Programs
From Communications of the ACM

Meaning and Context in Computer Programs

Sharing domain knowledge among programmers using the source code as the medium.

Federated Learning and Privacy
From Communications of the ACM

Federated Learning and Privacy

Building privacy-preserving systems for machine learning and data science on decentralized data.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account