Sign In

Communications of the ACM

Latest Practice



Dark Patterns
From Communications of the ACM

Dark Patterns: Past, Present, and Future

The evolution of tricky user interfaces.

Is Persistent Memory Persistent?
From Communications of the ACM

Is Persistent Memory Persistent?

A simple and inexpensive test of failure-atomic update mechanisms.

Power to the People
From Communications of the ACM

Power to the People

Reducing datacenter carbon footprints.

Demystifying Stablecoins
From Communications of the ACM

Demystifying Stablecoins

Cryptography meets monetary policy.

Commit to Memory
From Communications of the ACM

Commit to Memory

Chipping away at Moore's Law.

Managing the Hidden Costs of Coordination
From Communications of the ACM

Managing the Hidden Costs of Coordination

Controlling coordination costs when multiple, distributed perspectives are essential.

Cognitive Work of Hypothesis Exploration During Anomaly Response
From Communications of the ACM

Cognitive Work of Hypothesis Exploration During Anomaly Response

A look at how we respond to the unexpected.

Securing the Boot Process
From Communications of the ACM

Securing the Boot Process

The hardware root of trust.

Opening Up the Baseboard Management Controller
From Communications of the ACM

Opening Up the Baseboard Management Controller

If the CPU is the brain of the board, the BMC is the brain stem.

The Reliability of Enterprise Applications
From Communications of the ACM

The Reliability of Enterprise Applications

Understanding enterprise reliability.

Space Time Discontinuum
From Communications of the ACM

Space Time Discontinuum

Combining data from many sources may cause painful delays.

Hack for Hire
From Communications of the ACM

Hack for Hire

Investigating the emerging black market of retail email account hacking services.

API Practices If You Hate Your Customers
From Communications of the ACM

API Practices If You Hate Your Customers

Application programming interfaces speak louder than words.

Write Amplification vs. Read Perspiration
From Communications of the ACM

Write Amplification vs. Read Perspiration

The trade-offs between write and read.

Open Source Firmware
From Communications of the ACM

Open Source Firmware

Step into the world behind the kernel.

Extract, Shoehorn, and Load
From Communications of the ACM

Extract, Shoehorn, and Load

Data doesn't always fit nicely into a new home.

Access Controls and Healthcare Records
From Communications of the ACM

Access Controls and Healthcare Records: Who Owns the Data?

A discussion with David Evans, Richard McDonald, and Terry Coatta.

Achieving Digital Permanence
From Communications of the ACM

Achieving Digital Permanence

The many challenges to maintaining stored information and ways to overcome them.

Online Event Processing
From Communications of the ACM

Online Event Processing

Achieving consistency where distributed transactions have failed.

Net Neutrality
From Communications of the ACM

Net Neutrality: Unexpected Solution to Blockchain Scaling

Cloud-delivery networks could dramatically improve blockchains' scalability, but clouds must be provably neutral first.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account