Sign In

Communications of the ACM

Latest Practice



Borg, Omega, and Kubernetes
From Communications of the ACM

Borg, Omega, and Kubernetes

Lessons learned from three container-management systems over a decade.

Why Logical Clocks Are Easy
From Communications of the ACM

Why Logical Clocks Are Easy

Sometimes all you need is the right language.

Automation Should Be Like Iron Man, Not Ultron
From Communications of the ACM

Automation Should Be Like Iron Man, Not Ultron

The "Leftover Principle" requires increasingly more highly skilled humans.

Challenges of Memory Management on Modern NUMA Systems
From Communications of the ACM

Challenges of Memory Management on Modern NUMA Systems

Optimizing NUMA systems applications with Carrefour.

Fail at Scale
From Communications of the ACM

Fail at Scale

Reliability in the face of rapid change

Crash Consistency
From Communications of the ACM

Crash Consistency

Rethinking the fundamental abstractions of the file system.

From the EDVAC to WEBVACs
From Communications of the ACM

From the EDVAC to WEBVACs

Cloud computing for computer scientists.

Low-Latency Distributed Applications in Finance
From Communications of the ACM

Low-Latency Distributed Applications in Finance

The finance industry has unique demands for low-latency distributed systems.

Go Static or Go Home
From Communications of the ACM

Go Static or Go Home

In the end, dynamic systems are simply less secure.

Hadoop Superlinear Scalability
From Communications of the ACM

Hadoop Superlinear Scalability

The perpetual motion of parallel performance.

HTTP/2.0
From Communications of the ACM

HTTP/2.0: The IETF Is Phoning It In

Bad protocol, bad politics.

Securing Network Time Protocol
From Communications of the ACM

Securing Network Time Protocol

Crackers discover how to use NTP as a weapon for abuse.

Model-Based Testing
From Communications of the ACM

Model-Based Testing: Where Does It Stand?

MBT has positive effects on efficiency and effectiveness, even if it only partially fulfills high expectations.

Scalability Techniques for Practical Synchronization Primitives
From Communications of the ACM

Scalability Techniques for Practical Synchronization Primitives

Designing locking primitives with performance in mind.

No Such Thing as a General-Purpose Processor
From Communications of the ACM

No Such Thing as a General-Purpose Processor

And the belief in such a device is harmful.

Certificate Transparency
From Communications of the ACM

Certificate Transparency

Public, verifiable, append-only logs.

Why Is It Taking So Long to Secure Internet Routing?
From Communications of the ACM

Why Is It Taking So Long to Secure Internet Routing?

Routing security incidents can still slip past deployed security defenses.

The Network is Reliable
From Communications of the ACM

The Network is Reliable

An informal survey of real-world communications failures.

Securing the Tangled Web
From Communications of the ACM

Securing the Tangled Web

Preventing script injection vulnerabilities through software design.

Undergraduate Software Engineering
From Communications of the ACM

Undergraduate Software Engineering

Addressing the needs of professional software development.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account