Sign In

Communications of the ACM

Latest Practice



Demystifying Stablecoins
From Communications of the ACM

Demystifying Stablecoins

Cryptography meets monetary policy.

Communicate Using the Numbers 1, 2, 3, and More
From Communications of the ACM

Communicate Using the Numbers 1, 2, 3, and More

Leveraging expectations for better communication.

Managing the Hidden Costs of Coordination
From Communications of the ACM

Managing the Hidden Costs of Coordination

Controlling coordination costs when multiple, distributed perspectives are essential.

Cognitive Work of Hypothesis Exploration During Anomaly Response
From Communications of the ACM

Cognitive Work of Hypothesis Exploration During Anomaly Response

A look at how we respond to the unexpected.

The Reliability of Enterprise Applications
From Communications of the ACM

The Reliability of Enterprise Applications

Understanding enterprise reliability.

Space Time Discontinuum
From Communications of the ACM

Space Time Discontinuum

Combining data from many sources may cause painful delays.

Write Amplification vs. Read Perspiration
From Communications of the ACM

Write Amplification vs. Read Perspiration

The trade-offs between write and read.

Open Source Firmware
From Communications of the ACM

Open Source Firmware

Step into the world behind the kernel.

Demo Data as Code
From Communications of the ACM

Demo Data as Code

Automation helps collaboration.

The Evolution of Management
From Communications of the ACM

The Evolution of Management

Transitioning up the ladder.

Overly Attached
From Communications of the ACM

Overly Attached

Know when to let go of emotional attachment to your work.

Extract, Shoehorn, and Load
From Communications of the ACM

Extract, Shoehorn, and Load

Data doesn't always fit nicely into a new home.

The Top 10 Things Executives Should Know About Software
From Communications of the ACM

The Top 10 Things Executives Should Know About Software

Software acumen is the new norm.

Access Controls and Healthcare Records
From Communications of the ACM

Access Controls and Healthcare Records: Who Owns the Data?

A discussion with David Evans, Richard McDonald, and Terry Coatta.

How to Create a Great Team Culture (and Why It Matters)
From Communications of the ACM

How to Create a Great Team Culture (and Why It Matters)

Build safety, share vulnerability, and establish purpose.

Achieving Digital Permanence
From Communications of the ACM

Achieving Digital Permanence

The many challenges to maintaining stored information and ways to overcome them.

Online Event Processing
From Communications of the ACM

Online Event Processing

Achieving consistency where distributed transactions have failed.

Net Neutrality
From Communications of the ACM

Net Neutrality: Unexpected Solution to Blockchain Scaling

Cloud-delivery networks could dramatically improve blockchains' scalability, but clouds must be provably neutral first.

A Hitchhiker's Guide to the Blockchain Universe
From Communications of the ACM

A Hitchhiker's Guide to the Blockchain Universe

Blockchain remains a mystery, despite its growing acceptance.

Design Patterns for Managing Up
From Communications of the ACM

Design Patterns for Managing Up

Four challenging work situations and how to handle them.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account