Sign In

Communications of the ACM

Latest Practice



Everything VPN Is New Again
From Communications of the ACM

Everything VPN Is New Again

The 24-year-old security model has found a second wind.

A Second Conversation with Werner Vogels
From Communications of the ACM

A Second Conversation with Werner Vogels

The Amazon CTO sits with Tom Killalea to discuss designing for evolution at scale.

Differential Privacy
From Communications of the ACM

Differential Privacy: The Pursuit of Protections by Default

A discussion with Miguel Guevara, Damien Desfontaines, Jim Waldo, and Terry Coatta

The Time I Stole $10,000 from Bell Labs
From Communications of the ACM

The Time I Stole $10,000 from Bell Labs

Why DevOps encourages us to celebrate outages.

The Life of a Data Byte
From Communications of the ACM

The Life of a Data Byte

Be kind and rewind.

Five Nonobvious Remote Work Techniques
From Communications of the ACM

Five Nonobvious Remote Work Techniques

Emulating the efficiency of in-person conversations.

Data on the Outside versus Data on the Inside
From Communications of the ACM

Data on the Outside versus Data on the Inside

Data kept outside SQL has different characteristics from data kept inside.

Debugging Incidents in Google's Distributed Systems
From Communications of the ACM

Debugging Incidents in Google's Distributed Systems

How experts debug production issues in complex distributed systems.

To Catch a Failure
From Communications of the ACM

To Catch a Failure: The Record-and-Replay Approach to Debugging

A discussion with Robert O'Callahan, Kyle Huey, Devon O'Dell, and Terry Coatta.

The Best Place to Build a Subway
From Communications of the ACM

The Best Place to Build a Subway

Building projects despite (and because of) existing complex systems.

Communicate Using the Numbers 1, 2, 3, and More
From Communications of the ACM

Communicate Using the Numbers 1, 2, 3, and More

Leveraging expectations for better communication.

Beyond the 'Fix-It' Treadmill
From Communications of the ACM

Beyond the 'Fix-It' Treadmill

The use of post-incident artifacts in high-performing organizations.

Revealing the Critical Role of Human Performance in Software
From Communications of the ACM

Revealing the Critical Role of Human Performance in Software

It's time to appreciate the human side of Internet-facing software systems.

Above the Line, Below the Line
From Communications of the ACM

Above the Line, Below the Line

The resilience of Internet-facing systems relies on what is above the line of representation.

Optimizations in C++ Compilers
From Communications of the ACM

Optimizations in C++ Compilers

A practical journey.

Blockchain Technology
From Communications of the ACM

Blockchain Technology: What Is It Good For?

Industry's dreams and fears for this new technology.

Hack for Hire
From Communications of the ACM

Hack for Hire

Investigating the emerging black market of retail email account hacking services.

API Practices If You Hate Your Customers
From Communications of the ACM

API Practices If You Hate Your Customers

Application programming interfaces speak louder than words.

Demo Data as Code
From Communications of the ACM

Demo Data as Code

Automation helps collaboration.

The Evolution of Management
From Communications of the ACM

The Evolution of Management

Transitioning up the ladder.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account