acm-header
Sign In

Communications of the ACM

Latest Practice



Opening Up the Baseboard Management Controller
From Communications of the ACM

Opening Up the Baseboard Management Controller

If the CPU is the brain of the board, the BMC is the brain stem.

The Reliability of Enterprise Applications
From Communications of the ACM

The Reliability of Enterprise Applications

Understanding enterprise reliability.

Blockchain Technology
From Communications of the ACM

Blockchain Technology: What Is It Good For?

Industry's dreams and fears for this new technology.

Space Time Discontinuum
From Communications of the ACM

Space Time Discontinuum

Combining data from many sources may cause painful delays.

Hack for Hire
From Communications of the ACM

Hack for Hire

Investigating the emerging black market of retail email account hacking services.

API Practices If You Hate Your Customers
From Communications of the ACM

API Practices If You Hate Your Customers

Application programming interfaces speak louder than words.

Write Amplification vs. Read Perspiration
From Communications of the ACM

Write Amplification vs. Read Perspiration

The trade-offs between write and read.

Open Source Firmware
From Communications of the ACM

Open Source Firmware

Step into the world behind the kernel.

Demo Data as Code
From Communications of the ACM

Demo Data as Code

Automation helps collaboration.

Surviving Software Dependencies
From Communications of the ACM

Surviving Software Dependencies

Software reuse is finally here but comes with risks.

Velocity in Software Engineering
From Communications of the ACM

Velocity in Software Engineering

From tectonic plate to F-16.

Research for Practice: The DevOps Phenomenon
From Communications of the ACM

Research for Practice: The DevOps Phenomenon

An executive crash course.

Extract, Shoehorn, and Load
From Communications of the ACM

Extract, Shoehorn, and Load

Data doesn't always fit nicely into a new home.

Access Controls and Healthcare Records
From Communications of the ACM

Access Controls and Healthcare Records: Who Owns the Data?

A discussion with David Evans, Richard McDonald, and Terry Coatta.

Garbage Collection as a Joint Venture
From Communications of the ACM

Garbage Collection as a Joint Venture

A collaborative approach to reclaiming memory in heterogeneous software systems.

Research for Practice
From Communications of the ACM

Research for Practice: Troubling Trends in Machine-Learning Scholarship

Some ML papers suffer from flaws that could mislead the public and stymie future research.

Achieving Digital Permanence
From Communications of the ACM

Achieving Digital Permanence

The many challenges to maintaining stored information and ways to overcome them.

Online Event Processing
From Communications of the ACM

Online Event Processing

Achieving consistency where distributed transactions have failed.

Net Neutrality
From Communications of the ACM

Net Neutrality: Unexpected Solution to Blockchain Scaling

Cloud-delivery networks could dramatically improve blockchains' scalability, but clouds must be provably neutral first.

Identity by Any Other Name
From Communications of the ACM

Identity by Any Other Name

The complex cacophony of intertwined systems.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account