acm-header
Sign In

Communications of the ACM

Latest Practice



Thinking Clearly About Performance, Part 2
From Communications of the ACM

Thinking Clearly About Performance, Part 2

More important principles to keep in mind when designing high-performance software.

Thinking Clearly About Performance, Part 1
From Communications of the ACM

Thinking Clearly About Performance, Part 1

Improving the performance of complex software is difficult, but understanding some fundamental principles can make it easier.

Moving to the Edge: A CTO Roundtable on Network Virtualization
From Communications of the ACM

Moving to the Edge: A CTO Roundtable on Network Virtualization

Leading experts debate how virtualization and clouds impact network service architectures.

Software Development with Code Maps
From Communications of the ACM

Software Development with Code Maps

Could ubiquitous hand-drawn code map diagrams become a thing of the past?

The Ideal HPC Programming Language
From Communications of the ACM

The Ideal HPC Programming Language

Maybe it's Fortran. Or maybe it just doesn't matter.

Simplicity Betrayed
From Communications of the ACM

Simplicity Betrayed

Emulating a video system shows how even a simple interface can be more complex—and capable—than it appears.

Securing Elasticity in the Cloud
From Communications of the ACM

Securing Elasticity in the Cloud

Elastic computing has great potential, but many security challenges remain.

Why Cloud Computing Will Never Be Free
From Communications of the ACM

Why Cloud Computing Will Never Be Free

The competition among cloud providers may drive prices downward, but at what cost?

From Communications of the ACM

Enhanced Debugging With Traces

An essential technique used in emulator development is a useful addition to any programmer's toolbox.

A View of Cloud Computing
From Communications of the ACM

A View of Cloud Computing

Clearing the clouds away from the true potential and obstacles posed by this computing capability.

CTO Roundtable: Malware Defense
From Communications of the ACM

CTO Roundtable: Malware Defense

The battle is bigger than most of us realize.

Global IT Management
From Communications of the ACM

Global IT Management: Structuring For Scale, Responsiveness, and Innovation

To succeed on a global scale, businesses should focus on a trio of key elements.

GFS: Evolution on Fast-Forward
From Communications of the ACM

GFS: Evolution on Fast-Forward

Kirk McKusick and Sean Quinlan discuss the origin and evolution of the Google File System.

Software Model Checking Takes Off
From Communications of the ACM

Software Model Checking Takes Off

A translator framework enables the use of model checking in complex avionics systems and other industrial settings.

Managing Contention For Shared Resources on Multicore Processors
From Communications of the ACM

Managing Contention For Shared Resources on Multicore Processors

Contention for caches, memory controllers, and interconnects can be eased by contention-aware scheduling algorithms.

Power-Efficient Software
From Communications of the ACM

Power-Efficient Software

Power-manageable hardware can help save energy, but what can software developers do to address the problem?

Triple-Parity RAID and Beyond
From Communications of the ACM

Triple-Parity RAID and Beyond

As hard-drive capacities continue to outpace their throughput, the time has come for a new level of RAID.

Other People's Data
From Communications of the ACM

Other People's Data

Companies have access to more types of external data than ever before. How can they integrate it most effectively?

Maximizing Power Efficiency with Asymmetric Multicore Systems
From Communications of the ACM

Maximizing Power Efficiency with Asymmetric Multicore Systems

How do we develop software to make the most of the promise that asymmetric multicore systems use a lot less energy?

You Don't Know Jack About Software Maintenance
From Communications of the ACM

You Don't Know Jack About Software Maintenance

Long considered an afterthought, software maintenance is easiest and most effective when built into a system from the ground up.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account