acm-header
Sign In

Communications of the ACM

Latest Practice



Out-of-This-World Additive Manufacturing
From Communications of the ACM

Out-of-This-World Additive Manufacturing

From thingamabobs to rockets, 3D printing takes many forms.

The Time I Stole $10,000 from Bell Labs
From Communications of the ACM

The Time I Stole $10,000 from Bell Labs

Why DevOps encourages us to celebrate outages.

The Identity in Everyone's Pocket
From Communications of the ACM

The Identity in Everyone's Pocket

Keeping users secure through their smartphones.

Security Analysis of SMS as a Second Factor of Authentication
From Communications of the ACM

Security Analysis of SMS as a Second Factor of Authentication

The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping.

The Life of a Data Byte
From Communications of the ACM

The Life of a Data Byte

Be kind and rewind.

Dark Patterns
From Communications of the ACM

Dark Patterns: Past, Present, and Future

The evolution of tricky user interfaces.

Is Persistent Memory Persistent?
From Communications of the ACM

Is Persistent Memory Persistent?

A simple and inexpensive test of failure-atomic update mechanisms.

Demystifying Stablecoins
From Communications of the ACM

Demystifying Stablecoins

Cryptography meets monetary policy.

Managing the Hidden Costs of Coordination
From Communications of the ACM

Managing the Hidden Costs of Coordination

Controlling coordination costs when multiple, distributed perspectives are essential.

Cognitive Work of Hypothesis Exploration During Anomaly Response
From Communications of the ACM

Cognitive Work of Hypothesis Exploration During Anomaly Response

A look at how we respond to the unexpected.

The Reliability of Enterprise Applications
From Communications of the ACM

The Reliability of Enterprise Applications

Understanding enterprise reliability.

Space Time Discontinuum
From Communications of the ACM

Space Time Discontinuum

Combining data from many sources may cause painful delays.

Write Amplification vs. Read Perspiration
From Communications of the ACM

Write Amplification vs. Read Perspiration

The trade-offs between write and read.

The Effects of Mixing Machine Learning and Human Judgment
From Communications of the ACM

The Effects of Mixing Machine Learning and Human Judgment

Collaboration between humans and machines does not necessarily lead to better outcomes.

Open Source Firmware
From Communications of the ACM

Open Source Firmware

Step into the world behind the kernel.

Extract, Shoehorn, and Load
From Communications of the ACM

Extract, Shoehorn, and Load

Data doesn't always fit nicely into a new home.

Access Controls and Healthcare Records
From Communications of the ACM

Access Controls and Healthcare Records: Who Owns the Data?

A discussion with David Evans, Richard McDonald, and Terry Coatta.

Achieving Digital Permanence
From Communications of the ACM

Achieving Digital Permanence

The many challenges to maintaining stored information and ways to overcome them.

Online Event Processing
From Communications of the ACM

Online Event Processing

Achieving consistency where distributed transactions have failed.

Net Neutrality
From Communications of the ACM

Net Neutrality: Unexpected Solution to Blockchain Scaling

Cloud-delivery networks could dramatically improve blockchains' scalability, but clouds must be provably neutral first.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account