acm-header
Sign In

Communications of the ACM

Latest Practice



Managing Contention For Shared Resources on Multicore Processors
From Communications of the ACM

Managing Contention For Shared Resources on Multicore Processors

Contention for caches, memory controllers, and interconnects can be eased by contention-aware scheduling algorithms.

Power-Efficient Software
From Communications of the ACM

Power-Efficient Software

Power-manageable hardware can help save energy, but what can software developers do to address the problem?

Triple-Parity RAID and Beyond
From Communications of the ACM

Triple-Parity RAID and Beyond

As hard-drive capacities continue to outpace their throughput, the time has come for a new level of RAID.

Other People's Data
From Communications of the ACM

Other People's Data

Companies have access to more types of external data than ever before. How can they integrate it most effectively?

Data in Flight
From Communications of the ACM

Data in Flight

How streaming SQL technology can help solve the Web 2.0 data crunch.

Maximizing Power Efficiency with Asymmetric Multicore Systems
From Communications of the ACM

Maximizing Power Efficiency with Asymmetric Multicore Systems

How do we develop software to make the most of the promise that asymmetric multicore systems use a lot less energy?

What DNS Is Not
From Communications of the ACM

What DNS Is Not

DNS is many things to many people — perhaps too many things to too many people.

You Don't Know Jack About Software Maintenance
From Communications of the ACM

You Don't Know Jack About Software Maintenance

Long considered an afterthought, software maintenance is easiest and most effective when built into a system from the ground up.

Four Billion Little Brothers?
From Communications of the ACM

Four Billion Little Brothers?: Privacy, Mobile Phones, and Ubiquitous Data Collection

Participatory sensing technologies could improve our lives and our communities, but at what cost to our privacy?

Communications Surveillance: Privacy and Security at Risk
From Communications of the ACM

Communications Surveillance: Privacy and Security at Risk

As the sophistication of wiretapping technology grows, so too do the risks it poses to our privacy and security.

Probing Biomolecular Machines with Graphics Processors
From Communications of the ACM

Probing Biomolecular Machines with Graphics Processors

GPU acceleration and other computer performance increases will offer critical benefits to biomedical science.

Monitoring and Control of Large Systems With MonALISA
From Communications of the ACM

Monitoring and Control of Large Systems With MonALISA

MonALISA developers describe how it works, the key design principles behind it, and the biggest technical challenges in building it.

Reveling in Constraints
From Communications of the ACM

Reveling in Constraints

The Google Web Toolkit is an end-run around Web development obstacles.

CTO Roundtable
From Communications of the ACM

CTO Roundtable: Cloud Computing

The age of cloud computing has begun. How can companies take advantage of the new opportunities it provides?

The Pathologies of Big Data
From Communications of the ACM

The Pathologies of Big Data

Scale up your datasets enough and your apps come undone. What are the typical problems and where do the bottlenecks surface?

Browser Security
From Communications of the ACM

Browser Security: Lessons from Google Chrome

To shield the browser from attacks, Google Chrome developers eyed three key problems.

The Five-Minute Rule 20 Years Later
From Communications of the ACM

The Five-Minute Rule 20 Years Later

Revisiting Gray and Putzolu's famous rule in the age of Flash.

Whither Sockets?
From Communications of the ACM

Whither Sockets?

The pervasive and long-lasting sockets API has remained largely unchanged since 1982. How have developers worked around its inherent limitations and what is the...

Hard-Disk Drives: The Good, the Bad, and the Ugly
From Communications of the ACM

Hard-Disk Drives: The Good, the Bad, and the Ugly

New drive technologies and increased capacities create new categories of failure modes that will influence system designs.

Debugging AJAX in Production
From Communications of the ACM

Debugging AJAX in Production

Lacking proper browser support, what steps can we take to debug production AJAX code?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account