Sign In

Communications of the ACM

Latest Practice



The Identity in Everyone's Pocket
From Communications of the ACM

The Identity in Everyone's Pocket

Keeping users secure through their smartphones.

The Die is Cast
From Communications of the ACM

The Die is Cast

Hardware security is not assured.

Security Analysis of SMS as a Second Factor of Authentication
From Communications of the ACM

Security Analysis of SMS as a Second Factor of Authentication

The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping.

The Life of a Data Byte
From Communications of the ACM

The Life of a Data Byte

Be kind and rewind.

Five Nonobvious Remote Work Techniques
From Communications of the ACM

Five Nonobvious Remote Work Techniques

Emulating the efficiency of in-person conversations.

The History, Status, and Future of FPGAs
From Communications of the ACM

The History, Status, and Future of FPGAs

Hitting a nerve with field-programmable gate arrays.

Debugging Incidents in Google's Distributed Systems
From Communications of the ACM

Debugging Incidents in Google's Distributed Systems

How experts debug production issues in complex distributed systems.

Dark Patterns
From Communications of the ACM

Dark Patterns: Past, Present, and Future

The evolution of tricky user interfaces.

Power to the People
From Communications of the ACM

Power to the People

Reducing datacenter carbon footprints.

Demystifying Stablecoins
From Communications of the ACM

Demystifying Stablecoins

Cryptography meets monetary policy.

Commit to Memory
From Communications of the ACM

Commit to Memory

Chipping away at Moore's Law.

Communicate Using the Numbers 1, 2, 3, and More
From Communications of the ACM

Communicate Using the Numbers 1, 2, 3, and More

Leveraging expectations for better communication.

Securing the Boot Process
From Communications of the ACM

Securing the Boot Process

The hardware root of trust.

Opening Up the Baseboard Management Controller
From Communications of the ACM

Opening Up the Baseboard Management Controller

If the CPU is the brain of the board, the BMC is the brain stem.

The Reliability of Enterprise Applications
From Communications of the ACM

The Reliability of Enterprise Applications

Understanding enterprise reliability.

Hack for Hire
From Communications of the ACM

Hack for Hire

Investigating the emerging black market of retail email account hacking services.

API Practices If You Hate Your Customers
From Communications of the ACM

API Practices If You Hate Your Customers

Application programming interfaces speak louder than words.

Demo Data as Code
From Communications of the ACM

Demo Data as Code

Automation helps collaboration.

The Evolution of Management
From Communications of the ACM

The Evolution of Management

Transitioning up the ladder.

Overly Attached
From Communications of the ACM

Overly Attached

Know when to let go of emotional attachment to your work.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account