Sign In

Communications of the ACM

Latest Practice



Demystifying Stablecoins
From Communications of the ACM

Demystifying Stablecoins

Cryptography meets monetary policy.

Commit to Memory
From Communications of the ACM

Commit to Memory

Chipping away at Moore's Law.

Managing the Hidden Costs of Coordination
From Communications of the ACM

Managing the Hidden Costs of Coordination

Controlling coordination costs when multiple, distributed perspectives are essential.

Cognitive Work of Hypothesis Exploration During Anomaly Response
From Communications of the ACM

Cognitive Work of Hypothesis Exploration During Anomaly Response

A look at how we respond to the unexpected.

Securing the Boot Process
From Communications of the ACM

Securing the Boot Process

The hardware root of trust.

Opening Up the Baseboard Management Controller
From Communications of the ACM

Opening Up the Baseboard Management Controller

If the CPU is the brain of the board, the BMC is the brain stem.

The Reliability of Enterprise Applications
From Communications of the ACM

The Reliability of Enterprise Applications

Understanding enterprise reliability.

Space Time Discontinuum
From Communications of the ACM

Space Time Discontinuum

Combining data from many sources may cause painful delays.

Hack for Hire
From Communications of the ACM

Hack for Hire

Investigating the emerging black market of retail email account hacking services.

API Practices If You Hate Your Customers
From Communications of the ACM

API Practices If You Hate Your Customers

Application programming interfaces speak louder than words.

Write Amplification vs. Read Perspiration
From Communications of the ACM

Write Amplification vs. Read Perspiration

The trade-offs between write and read.

Open Source Firmware
From Communications of the ACM

Open Source Firmware

Step into the world behind the kernel.

Demo Data as Code
From Communications of the ACM

Demo Data as Code

Automation helps collaboration.

Extract, Shoehorn, and Load
From Communications of the ACM

Extract, Shoehorn, and Load

Data doesn't always fit nicely into a new home.

Access Controls and Healthcare Records
From Communications of the ACM

Access Controls and Healthcare Records: Who Owns the Data?

A discussion with David Evans, Richard McDonald, and Terry Coatta.

Achieving Digital Permanence
From Communications of the ACM

Achieving Digital Permanence

The many challenges to maintaining stored information and ways to overcome them.

Online Event Processing
From Communications of the ACM

Online Event Processing

Achieving consistency where distributed transactions have failed.

Net Neutrality
From Communications of the ACM

Net Neutrality: Unexpected Solution to Blockchain Scaling

Cloud-delivery networks could dramatically improve blockchains' scalability, but clouds must be provably neutral first.

A Hitchhiker's Guide to the Blockchain Universe
From Communications of the ACM

A Hitchhiker's Guide to the Blockchain Universe

Blockchain remains a mystery, despite its growing acceptance.

Understanding Database Reconstruction Attacks on Public Data
From Communications of the ACM

Understanding Database Reconstruction Attacks on Public Data

These attacks on statistical databases are no longer a theoretical danger.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account