acm-header
Sign In

Communications of the ACM

Latest Practice



CPU DB: Recording Microprocessor History
From Communications of the ACM

CPU DB: Recording Microprocessor History

With the open CPU DB database, you can mine microprocessor trends over the past 40 years.

SAGE: Whitebox Fuzzing For Security Testing
From Communications of the ACM

SAGE: Whitebox Fuzzing For Security Testing

SAGE has had a remarkable impact at Microsoft.

The Hyperdimensional Tar Pit
From Communications of the ACM

The Hyperdimensional Tar Pit

Make a guess, double the number, and then move to the next larger unit of time.

Advances and Challenges in Log Analysis
From Communications of the ACM

Advances and Challenges in Log Analysis

Logs contain a wealth of information to help manage systems.

How Will Astronomy Archives Survive the Data Tsunami?
From Communications of the ACM

How Will Astronomy Archives Survive the Data Tsunami?

Astronomers are collecting more data than ever. What practices can keep them ahead of the flood?

ACM CTO Roundtable on Mobile Devices in the Enterprise
From Communications of the ACM

ACM CTO Roundtable on Mobile Devices in the Enterprise

Finding solutions as growth and fragmentation complicate mobile device support.

The Most Expensive One-Byte Mistake
From Communications of the ACM

The Most Expensive One-Byte Mistake

Did Ken, Dennis, and Brian choose wrong with NUL-terminated text strings?

Arrogance in Business Planning
From Communications of the ACM

Arrogance in Business Planning

Technology business plans that assume no competition — ever.

Computing Without Processors
From Communications of the ACM

Computing Without Processors

Heterogeneous systems allow us to target our programming to the appropriate environment.

The Pain of Implementing LINQ Providers
From Communications of the ACM

The Pain of Implementing LINQ Providers

It's no easy task for NoSQL.

If You Have Too Much Data, Then 'Good Enough' Is Good Enough
From Communications of the ACM

If You Have Too Much Data, Then 'Good Enough' Is Good Enough

In today's humongous database systems, clarity may be relaxed, but business needs can still be met.

Scalable SQL
From Communications of the ACM

Scalable SQL

How do large-scale sites and applications remain SQL-based?

The One-Second War
From Communications of the ACM

The One-Second War

Finding a lasting solution to the leap seconds problem has become increasingly urgent.

A Co-Relational Model of Data For Large Shared Data Banks
From Communications of the ACM

A Co-Relational Model of Data For Large Shared Data Banks

Contrary to popular belief, SQL and noSQL are really just two sides of the same coin.

UX Design and Agile: A Natural Fit?
From Communications of the ACM

UX Design and Agile: A Natural Fit?

Talking with Julian Gosper, Jean-Luc Agathos, Richard Rutter, and Terry Coatta.

The Theft of Business Innovation
From Communications of the ACM

The Theft of Business Innovation: An ACM-BCS Roundtable on Threats to Global Competitiveness

These days, cybercriminals are looking to steal more than just banking information.

A Conversation with Ed Catmull
From Communications of the ACM

A Conversation with Ed Catmull

Pixar's president Ed Catmull sits down with Stanford professor (and former Pixar-ian) Pat Hanrahan to reflect on the blending of art and technology.

Keeping Bits Safe: How Hard Can It Be?
From Communications of the ACM

Keeping Bits Safe: How Hard Can It Be?

As storage systems grow larger and larger, protecting their data for long-term storage is becoming ever more challenging.

The Case Against Data Lock-In
From Communications of the ACM

The Case Against Data Lock-In

Want to keep your users? Just make it easy for them to leave.

Tackling Architectural Complexity with Modeling
From Communications of the ACM

Tackling Architectural Complexity with Modeling

Component models can help diagnose architectural problems in both new and existing systems.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account