acm-header
Sign In

Communications of the ACM

Latest Practice



Introducing Research For Practice
From Communications of the ACM

Introducing Research For Practice

Expert-curated guides to the best of CS research.

10 Optimizations on Linear Search
From Communications of the ACM

10 Optimizations on Linear Search

The operations side of the story.

The Singular Success of SQL
From Communications of the ACM

The Singular Success of SQL

SQL has a brilliant future as a major figure in the pantheon of data representations.

More Encryption Means Less Privacy
From Communications of the ACM

More Encryption Means Less Privacy

Retaining electronic privacy requires more political engagement.

Schema.org
From Communications of the ACM

Schema.org: Evolution of Structured Data on the Web

Big data makes common schemas even more necessary.

Non-Volatile Storage
From Communications of the ACM

Non-Volatile Storage

Implications of the datacenter's shifting center.

How to De-Identify Your Data
From Communications of the ACM

How to De-Identify Your Data

Balancing statistical accuracy and subject privacy in large social-science datasets.

Natural Language Translation at the Intersection of AI and HCI
From Communications of the ACM

Natural Language Translation at the Intersection of AI and HCI

Old questions being answered with both AI and HCI.

Testing Web Applications with State Objects
From Communications of the ACM

Testing Web Applications with State Objects

Use states to drive your tests.

The Science of Managing Data Science
From Communications of the ACM

The Science of Managing Data Science

Lessons learned managing a data science research team.

Security Collapse in the HTTPS Market
From Communications of the ACM

Security Collapse in the HTTPS Market

Assessing legal and technical solutions to secure HTTPS.

Privacy, Anonymity, and Big Data in the Social Sciences
From Communications of the ACM

Privacy, Anonymity, and Big Data in the Social Sciences

Quality social science research and the privacy of human subjects require trust.

Bringing Arbitrary Compute to Authoritative Data
From Communications of the ACM

Bringing Arbitrary Compute to Authoritative Data

Many disparate use cases can be satisfied with a single storage system.

Who Must You Trust?
From Communications of the ACM

Who Must You Trust?

You must have some trust if you want to get anything done.

Automated QA Testing at Electronic Arts
From Communications of the ACM

Automated QA Testing at Electronic Arts

A discussion with Michael Donat, Jafar Husain, and Terry Coatta

The NSA and Snowden
From Communications of the ACM

The NSA and Snowden: Securing the All-Seeing Eye

How good security at the NSA could have stopped him.

A Primer on Provenance
From Communications of the ACM

A Primer on Provenance

Better understanding data requires tracking its history and context.

Don't Settle For Eventual Consistency
From Communications of the ACM

Don't Settle For Eventual Consistency

Stronger properties for low-latency geo-replicated storage.

Eventually Consistent
From Communications of the ACM

Eventually Consistent: Not What You Were Expecting?

Methods of quantifying consistency (or lack thereof) in eventually consistent storage systems.

Provenance in Sensor Data Management
From Communications of the ACM

Provenance in Sensor Data Management

A cohesive, independent solution for bringing provenance to scientific research.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account