Sign In

Communications of the ACM

Latest Practice



The Best Place to Build a Subway
From Communications of the ACM

The Best Place to Build a Subway

Building projects despite (and because of) existing complex systems.

Commit to Memory
From Communications of the ACM

Commit to Memory

Chipping away at Moore's Law.

Securing the Boot Process
From Communications of the ACM

Securing the Boot Process

The hardware root of trust.

Opening Up the Baseboard Management Controller
From Communications of the ACM

Opening Up the Baseboard Management Controller

If the CPU is the brain of the board, the BMC is the brain stem.

The Reliability of Enterprise Applications
From Communications of the ACM

The Reliability of Enterprise Applications

Understanding enterprise reliability.

Hack for Hire
From Communications of the ACM

Hack for Hire

Investigating the emerging black market of retail email account hacking services.

API Practices If You Hate Your Customers
From Communications of the ACM

API Practices If You Hate Your Customers

Application programming interfaces speak louder than words.

Open Source Firmware
From Communications of the ACM

Open Source Firmware

Step into the world behind the kernel.

Identity by Any Other Name
From Communications of the ACM

Identity by Any Other Name

The complex cacophony of intertwined systems.

Research for Practice: Edge Computing
From Communications of the ACM

Research for Practice: Edge Computing

Scaling resources within multiple administrative domains.

Understanding Database Reconstruction Attacks on Public Data
From Communications of the ACM

Understanding Database Reconstruction Attacks on Public Data

These attacks on statistical databases are no longer a theoretical danger.

Corp to Cloud: Google's Virtual Desktops
From Communications of the ACM

Corp to Cloud: Google's Virtual Desktops

How Google moved its virtual desktops to the cloud.

Research for Practice
From Communications of the ACM

Research for Practice: FPGAs in Datacenters

Expert-curated guides to the best of CS research.

C Is Not a Low-Level Language
From Communications of the ACM

C Is Not a Low-Level Language

Your computer is not a fast PDP-11.

Titus
From Communications of the ACM

Titus: Introducing Containers to the Netflix Cloud

Approaching container adoption in an already cloud-native infrastructure.

Network Applications Are Interactive
From Communications of the ACM

Network Applications Are Interactive

The network era requires new models, with interactions instead of algorithms.

Abstracting the Geniuses Away from Failure Testing
From Communications of the ACM

Abstracting the Geniuses Away from Failure Testing

Ordinary users need tools that automate the selection of custom-tailored faults to inject.

The Calculus of Service Availability
From Communications of the ACM

The Calculus of Service Availability

You're only as available as the sum of your dependencies.

Research For Practice
From Communications of the ACM

Research For Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware For Deep Learning

Expert-curated guides to the best of CS research.

Pervasive, Dynamic Authentication of Physical Items
From Communications of the ACM

Pervasive, Dynamic Authentication of Physical Items

The use of silicon PUF circuits.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account