acm-header
Sign In

Communications of the ACM

Latest Practice



The Flame Graph
From Communications of the ACM

The Flame Graph

This visualization of software execution is a new necessity for performance profiling and debugging.

More Encryption Means Less Privacy
From Communications of the ACM

More Encryption Means Less Privacy

Retaining electronic privacy requires more political engagement.

Why Logical Clocks Are Easy
From Communications of the ACM

Why Logical Clocks Are Easy

Sometimes all you need is the right language.

Schema.org
From Communications of the ACM

Schema.org: Evolution of Structured Data on the Web

Big data makes common schemas even more necessary.

Non-Volatile Storage
From Communications of the ACM

Non-Volatile Storage

Implications of the datacenter's shifting center.

Immutability Changes Everything
From Communications of the ACM

Immutability Changes Everything

We need it, we can afford it, and the time is now.

How to De-Identify Your Data
From Communications of the ACM

How to De-Identify Your Data

Balancing statistical accuracy and subject privacy in large social-science datasets.

Dismantling the Barriers to Entry
From Communications of the ACM

Dismantling the Barriers to Entry

We have to choose to build a Web that is accessible to everyone.

Natural Language Translation at the Intersection of AI and HCI
From Communications of the ACM

Natural Language Translation at the Intersection of AI and HCI

Old questions being answered with both AI and HCI.

Testing Web Applications with State Objects
From Communications of the ACM

Testing Web Applications with State Objects

Use states to drive your tests.

The Science of Managing Data Science
From Communications of the ACM

The Science of Managing Data Science

Lessons learned managing a data science research team.

Parallel Processing with <code>Promises</code>
From Communications of the ACM

Parallel Processing with Promises

A simple method of writing a collaborative system.

Go Static or Go Home
From Communications of the ACM

Go Static or Go Home

In the end, dynamic systems are simply less secure.

Securing Network Time Protocol
From Communications of the ACM

Securing Network Time Protocol

Crackers discover how to use NTP as a weapon for abuse.

Internal Access Controls
From Communications of the ACM

Internal Access Controls

Trust, but verify.

The Responsive Enterprise
From Communications of the ACM

The Responsive Enterprise: Embracing the Hacker Way

Soon every company will be a software company.

Evolution of the Product Manager
From Communications of the ACM

Evolution of the Product Manager

Better education needed to develop the discipline.

Certificate Transparency
From Communications of the ACM

Certificate Transparency

Public, verifiable, append-only logs.

Security Collapse in the HTTPS Market
From Communications of the ACM

Security Collapse in the HTTPS Market

Assessing legal and technical solutions to secure HTTPS.

Privacy, Anonymity, and Big Data in the Social Sciences
From Communications of the ACM

Privacy, Anonymity, and Big Data in the Social Sciences

Quality social science research and the privacy of human subjects require trust.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account