Sign In

Communications of the ACM

Latest Practice



How to De-Identify Your Data
From Communications of the ACM

How to De-Identify Your Data

Balancing statistical accuracy and subject privacy in large social-science datasets.

It Probably Works
From Communications of the ACM

It Probably Works

Probabilistic algorithms are all around us. Not only are they acceptable, some programmers actually seek out chances to use them.

The NSA and Snowden
From Communications of the ACM

The NSA and Snowden: Securing the All-Seeing Eye

How good security at the NSA could have stopped him.

The API Performance Contract
From Communications of the ACM

The API Performance Contract

How can the expected interactions between caller and implementation be guaranteed?

Unikernels
From Communications of the ACM

Unikernels: The Rise of the Virtual Library Operating System

What if all the software layers in a virtual appliance were compiled within the same safe, high-level language framework?

Leaking Space
From Communications of the ACM

Leaking Space

Eliminating memory hogs.

Nonblocking Algorithms and Scalable Multicore Programming
From Communications of the ACM

Nonblocking Algorithms and Scalable Multicore Programming

Exploring an alternative to lock-based synchronization.

A New Objective-C Runtime
From Communications of the ACM

A New Objective-C Runtime: From Research to Production

Backward compatibility always trumps new features.

Idempotence is Not a Medical Condition
From Communications of the ACM

Idempotence is Not a Medical Condition

Messages may be retried. Idempotence means that's OK.

Weapons of Mass Assignment
From Communications of the ACM

Weapons of Mass Assignment

A Ruby on Rails app highlights some serious, yet easily avoided, security vulnerabilities.

Keeping Bits Safe: How Hard Can It Be?
From Communications of the ACM

Keeping Bits Safe: How Hard Can It Be?

As storage systems grow larger and larger, protecting their data for long-term storage is becoming ever more challenging.

CTO Roundtable: Malware Defense
From Communications of the ACM

CTO Roundtable: Malware Defense

The battle is bigger than most of us realize.

From Communications of the ACM

Software Engineering and Formal Methods

The answer to software reliability concerns may lie in formal methods.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account