acm-header
Sign In

Communications of the ACM

Latest Practice



Lamboozling Attackers
From Communications of the ACM

Lamboozling Attackers: A New Generation of Deception

Software engineering teams can exploit attackers' human nature by building deception environments.

It Takes a Community
From Communications of the ACM

It Takes a Community: The Open Source Challenge

A discussion with Reynold Xin, Wes McKinney, Alan Gates, and Chris McCubbin.

Meaning and Context in Computer Programs
From Communications of the ACM

Meaning and Context in Computer Programs

Sharing domain knowledge among programmers using the source code as the medium.

A Conversation with Margo Seltzer and Mike Olson
From Communications of the ACM

A Conversation with Margo Seltzer and Mike Olson

The history of Berkeley DB.

Static Analysis at GitHub
From Communications of the ACM

Static Analysis at GitHub

An experience report.

Designing UIs for Static-Analysis Tools
From Communications of the ACM

Designing UIs for Static-Analysis Tools

Evaluating tool design guidelines with SWAN.

Static Analysis
From Communications of the ACM

Static Analysis

The fundamental challenge of software engineering is one of complexity.

Software Development in Disruptive Times
From Communications of the ACM

Software Development in Disruptive Times

Creating a software solution with fast decision capability, agile project management, and extreme low-code technology.

The Complex Path to Quantum Resistance
From Communications of the ACM

The Complex Path to Quantum Resistance

Is your organization prepared?

Quantum-Safe Trust for Vehicles
From Communications of the ACM

Quantum-Safe Trust for Vehicles: The Race Is Already On

A discussion of concerns on quantum vulnerability for the automobile industry.

Application Frameworks
From Communications of the ACM

Application Frameworks

While powerful, frameworks are not for everyone.

The SPACE of Developer Productivity
From Communications of the ACM

The SPACE of Developer Productivity

There's more to it than you think.

Enclaves in the Clouds
From Communications of the ACM

Enclaves in the Clouds

Legal considerations and broader implications

Everything VPN Is New Again
From Communications of the ACM

Everything VPN Is New Again

The 24-year-old security model has found a second wind.

A Second Conversation with Werner Vogels
From Communications of the ACM

A Second Conversation with Werner Vogels

The Amazon CTO sits with Tom Killalea to discuss designing for evolution at scale.

Differential Privacy
From Communications of the ACM

Differential Privacy: The Pursuit of Protections by Default

A discussion with Miguel Guevara, Damien Desfontaines, Jim Waldo, and Terry Coatta

The Time I Stole $10,000 from Bell Labs
From Communications of the ACM

The Time I Stole $10,000 from Bell Labs

Why DevOps encourages us to celebrate outages.

The Life of a Data Byte
From Communications of the ACM

The Life of a Data Byte

Be kind and rewind.

Five Nonobvious Remote Work Techniques
From Communications of the ACM

Five Nonobvious Remote Work Techniques

Emulating the efficiency of in-person conversations.

Data on the Outside versus Data on the Inside
From Communications of the ACM

Data on the Outside versus Data on the Inside

Data kept outside SQL has different characteristics from data kept inside.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account