acm-header
Sign In

Communications of the ACM

Latest Practice



Securing Elasticity in the Cloud
From Communications of the ACM

Securing Elasticity in the Cloud

Elastic computing has great potential, but many security challenges remain.

Cooling the Data Center
From Communications of the ACM

Cooling the Data Center

What can be done to make cooling systems in data centers more energy efficient?

Global IT Management
From Communications of the ACM

Global IT Management: Structuring For Scale, Responsiveness, and Innovation

To succeed on a global scale, businesses should focus on a trio of key elements.

A Threat Analysis of RFID Passports
From Communications of the ACM

A Threat Analysis of RFID Passports

An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?

You Don't Know Jack About Software Maintenance
From Communications of the ACM

You Don't Know Jack About Software Maintenance

Long considered an afterthought, software maintenance is easiest and most effective when built into a system from the ground up.

Communications Surveillance: Privacy and Security at Risk
From Communications of the ACM

Communications Surveillance: Privacy and Security at Risk

As the sophistication of wiretapping technology grows, so too do the risks it poses to our privacy and security.

Browser Security
From Communications of the ACM

Browser Security: Lessons from Google Chrome

To shield the browser from attacks, Google Chrome developers eyed three key problems.

Hard-Disk Drives: The Good, the Bad, and the Ugly
From Communications of the ACM

Hard-Disk Drives: The Good, the Bad, and the Ugly

New drive technologies and increased capacities create new categories of failure modes that will influence system designs.

Security in the Browser
From Communications of the ACM

Security in the Browser

Users with no security training download Web browsers from the Internet without precaution, and demand that they be fast and easy to use. What can be done to make ...

Cybercrime 2.0
From Communications of the ACM

Cybercrime 2.0: When the Cloud Turns Dark

Web-based malware attacks are more insidious than ever. What can be done to stem the tide?

CTO Virtualization Roundtable
From Communications of the ACM

CTO Virtualization Roundtable: Part II

When it comes to virtualization platforms, experts say focus first on the services to be delivered.

CTO Roundtable on Virtualization
From Communications of the ACM

CTO Roundtable on Virtualization: Part I

Virtualization technology is hot again, but for the right reasons?

Code Spelunking Redux
From Communications of the ACM

Code Spelunking Redux

Is it getting any easier to understand other people's code?

Document Design Matters
From Communications of the ACM

Document Design Matters

How do we apply the concept of resource orientation by designing representations to support interactions?

From Communications of the ACM

Software Engineering and Formal Methods

The answer to software reliability concerns may lie in formal methods.

From Communications of the ACM

The Rise and Fall of CORBA

There's a lot we can learn from CORBA's mistakes.

From Communications of the ACM

Scaling in Games and Virtual Worlds

Online games and virtual worlds have familiar scaling requirements, but don't be fooled: Everything you know is wrong.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account