acm-header
Sign In

Communications of the ACM

Latest Practice



The One-Second War
From Communications of the ACM

The One-Second War

Finding a lasting solution to the leap seconds problem has become increasingly urgent.

Mobile Application Development
From Communications of the ACM

Mobile Application Development: Web vs. Native

Web apps are cheaper to develop and deploy than native apps, but can they match the native user experience?

Weapons of Mass Assignment
From Communications of the ACM

Weapons of Mass Assignment

A Ruby on Rails app highlights some serious, yet easily avoided, security vulnerabilities.

A Co-Relational Model of Data For Large Shared Data Banks
From Communications of the ACM

A Co-Relational Model of Data For Large Shared Data Banks

Contrary to popular belief, SQL and noSQL are really just two sides of the same coin.

Successful Strategies For IPv6 Rollouts. Really.
From Communications of the ACM

Successful Strategies For IPv6 Rollouts. Really.

Knowing where to begin is half the battle.

Returning Control to the Programmer: SIMD Intrinsics For Virtual Machines
From Communications of the ACM

Returning Control to the Programmer: SIMD Intrinsics For Virtual Machines

Exposing SIMD units within interpreted languages could simplify programs and unleash floods of untapped processor power.

B.Y.O.C (1,342 Times and Counting)
From Communications of the ACM

B.Y.O.C (1,342 Times and Counting)

Why can't we all use standard libraries for commonly needed algorithms?

National Internet Defense - Small States on the Skirmish Line
From Communications of the ACM

National Internet Defense - Small States on the Skirmish Line

Despite the global and borderless nature of the Internet's underlying protocols and driving philosophy, there are significant ways in which it remains substantively...

Testable System Administration
From Communications of the ACM

Testable System Administration

As we progress into an information age, humans will need to work less like the machines they use and embrace...

System Administration Soft Skills
From Communications of the ACM

System Administration Soft Skills

How can system administrators reduce stress and conflict in the workplace?

A Plea from Sysadmins to Software Vendors
From Communications of the ACM

A Plea from Sysadmins to Software Vendors: 10 Do's and Don'ts

What can software vendors do to make the lives of system administrators a little easier?

Finding Usability Bugs with Automated Tests
From Communications of the ACM

Finding Usability Bugs with Automated Tests

Ideally, all software should be easy to use and accessible for a wide range of people. However, software often falls short of these basic goals. We therefore need...

Virtualization: Blessing or Curse?
From Communications of the ACM

Virtualization: Blessing or Curse?

Managing virtualization at a large scale is fraught with hidden challenges.

UX Design and Agile: A Natural Fit?
From Communications of the ACM

UX Design and Agile: A Natural Fit?

Talking with Julian Gosper, Jean-Luc Agathos, Richard Rutter, and Terry Coatta.

Collaboration in System Administration
From Communications of the ACM

Collaboration in System Administration

For sysadmins, solving problems usually involves collaborating with others. How can we make it more effective?

The Theft of Business Innovation
From Communications of the ACM

The Theft of Business Innovation: An ACM-BCS Roundtable on Threats to Global Competitiveness

These days, cybercriminals are looking to steal more than just banking information.

A Conversation with Ed Catmull
From Communications of the ACM

A Conversation with Ed Catmull

Pixar's president Ed Catmull sits down with Stanford professor (and former Pixar-ian) Pat Hanrahan to reflect on the blending of art and technology.

Sir, Please Step Away from the ASR-33!
From Communications of the ACM

Sir, Please Step Away from the ASR-33!

To move forward with programming languages we must first break free from the tyranny of ASCII.

Keeping Bits Safe: How Hard Can It Be?
From Communications of the ACM

Keeping Bits Safe: How Hard Can It Be?

As storage systems grow larger and larger, protecting their data for long-term storage is becoming ever more challenging.

The Case Against Data Lock-In
From Communications of the ACM

The Case Against Data Lock-In

Want to keep your users? Just make it easy for them to leave.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account