Sign In

Communications of the ACM

Latest Practice



Toward Confidential Cloud Computing
From Communications of the ACM

Toward Confidential Cloud Computing

Extending hardware-enforced cryptographic protection to data while in use.

Battery Day
From Communications of the ACM

Battery Day

A closer look at the technology that makes portable electronics possible.

Everything VPN Is New Again
From Communications of the ACM

Everything VPN Is New Again

The 24-year-old security model has found a second wind.

Out-of-This-World Additive Manufacturing
From Communications of the ACM

Out-of-This-World Additive Manufacturing

From thingamabobs to rockets, 3D printing takes many forms.

The Die is Cast
From Communications of the ACM

The Die is Cast

Hardware security is not assured.

The Life of a Data Byte
From Communications of the ACM

The Life of a Data Byte

Be kind and rewind.

The History, Status, and Future of FPGAs
From Communications of the ACM

The History, Status, and Future of FPGAs

Hitting a nerve with field-programmable gate arrays.

Dark Patterns
From Communications of the ACM

Dark Patterns: Past, Present, and Future

The evolution of tricky user interfaces.

Is Persistent Memory Persistent?
From Communications of the ACM

Is Persistent Memory Persistent?

A simple and inexpensive test of failure-atomic update mechanisms.

Power to the People
From Communications of the ACM

Power to the People

Reducing datacenter carbon footprints.

The Best Place to Build a Subway
From Communications of the ACM

The Best Place to Build a Subway

Building projects despite (and because of) existing complex systems.

Commit to Memory
From Communications of the ACM

Commit to Memory

Chipping away at Moore's Law.

Securing the Boot Process
From Communications of the ACM

Securing the Boot Process

The hardware root of trust.

Opening Up the Baseboard Management Controller
From Communications of the ACM

Opening Up the Baseboard Management Controller

If the CPU is the brain of the board, the BMC is the brain stem.

The Reliability of Enterprise Applications
From Communications of the ACM

The Reliability of Enterprise Applications

Understanding enterprise reliability.

Hack for Hire
From Communications of the ACM

Hack for Hire

Investigating the emerging black market of retail email account hacking services.

API Practices If You Hate Your Customers
From Communications of the ACM

API Practices If You Hate Your Customers

Application programming interfaces speak louder than words.

Open Source Firmware
From Communications of the ACM

Open Source Firmware

Step into the world behind the kernel.

Identity by Any Other Name
From Communications of the ACM

Identity by Any Other Name

The complex cacophony of intertwined systems.

Research for Practice: Edge Computing
From Communications of the ACM

Research for Practice: Edge Computing

Scaling resources within multiple administrative domains.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account