Sign In

Communications of the ACM

Latest Practice



Securing the Boot Process
From Communications of the ACM

Securing the Boot Process

The hardware root of trust.

Opening Up the Baseboard Management Controller
From Communications of the ACM

Opening Up the Baseboard Management Controller

If the CPU is the brain of the board, the BMC is the brain stem.

The Reliability of Enterprise Applications
From Communications of the ACM

The Reliability of Enterprise Applications

Understanding enterprise reliability.

Hack for Hire
From Communications of the ACM

Hack for Hire

Investigating the emerging black market of retail email account hacking services.

API Practices If You Hate Your Customers
From Communications of the ACM

API Practices If You Hate Your Customers

Application programming interfaces speak louder than words.

Demo Data as Code
From Communications of the ACM

Demo Data as Code

Automation helps collaboration.

The Evolution of Management
From Communications of the ACM

The Evolution of Management

Transitioning up the ladder.

Overly Attached
From Communications of the ACM

Overly Attached

Know when to let go of emotional attachment to your work.

The Top 10 Things Executives Should Know About Software
From Communications of the ACM

The Top 10 Things Executives Should Know About Software

Software acumen is the new norm.

Access Controls and Healthcare Records
From Communications of the ACM

Access Controls and Healthcare Records: Who Owns the Data?

A discussion with David Evans, Richard McDonald, and Terry Coatta.

How to Create a Great Team Culture (and Why It Matters)
From Communications of the ACM

How to Create a Great Team Culture (and Why It Matters)

Build safety, share vulnerability, and establish purpose.

Design Patterns for Managing ­Up
From Communications of the ACM

Design Patterns for Managing ­Up

Four challenging work situations and how to handle them.

­Understanding Database Reconstruction Attacks on Public Data
From Communications of the ACM

­Understanding Database Reconstruction Attacks on Public Data

These attacks on statistical databases are no longer a theoretical danger.

The Importance of a Great Finish
From Communications of the ACM

The Importance of a Great Finish

You have to finish strong, every time.

Research for Practice
From Communications of the ACM

Research for Practice: Security for the Modern Age

Securely running processes that require the entire syscall interface.

How to Live in a Post-Meltdown and -Spectre World
From Communications of the ACM

How to Live in a Post-Meltdown and -Spectre World

Learn from the past to prepare for the next battle.

How to Get Things Done When You Don't Feel Like It
From Communications of the ACM

How to Get Things Done When You Don't Feel Like It

Five strategies for pushing through.

Corp to Cloud: Google's Virtual Desktops
From Communications of the ACM

Corp to Cloud: Google's Virtual Desktops

How Google moved its virtual desktops to the cloud.

Tracking and Controlling Microservice Dependencies
From Communications of the ACM

Tracking and Controlling Microservice Dependencies

Dependency management is a crucial part of system and software design.

The Secret Formula for Choosing the Right Next Role
From Communications of the ACM

The Secret Formula for Choosing the Right Next Role

The best careers are not defined by titles or résumé bullet points.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account