acm-header
Sign In

Communications of the ACM

Latest Practice



Collaboration in System Administration
From Communications of the ACM

Collaboration in System Administration

For sysadmins, solving problems usually involves collaborating with others. How can we make it more effective?

The Theft of Business Innovation
From Communications of the ACM

The Theft of Business Innovation: An ACM-BCS Roundtable on Threats to Global Competitiveness

These days, cybercriminals are looking to steal more than just banking information.

A Conversation with Ed Catmull
From Communications of the ACM

A Conversation with Ed Catmull

Pixar's president Ed Catmull sits down with Stanford professor (and former Pixar-ian) Pat Hanrahan to reflect on the blending of art and technology.

Sir, Please Step Away from the ASR-33!
From Communications of the ACM

Sir, Please Step Away from the ASR-33!

To move forward with programming languages we must first break free from the tyranny of ASCII.

Computers in Patient Care: The Promise and the Challenge
From Communications of the ACM

Computers in Patient Care: The Promise and the Challenge

Information technology has the potential to radically transform health care. Why has progress been so slow?

Seven Principles For Selecting Software Packages
From Communications of the ACM

Seven Principles For Selecting Software Packages

Everything you always wanted to know but were afraid to ask about the decision-making process.

Securing Elasticity in the Cloud
From Communications of the ACM

Securing Elasticity in the Cloud

Elastic computing has great potential, but many security challenges remain.

Cooling the Data Center
From Communications of the ACM

Cooling the Data Center

What can be done to make cooling systems in data centers more energy efficient?

Global IT Management
From Communications of the ACM

Global IT Management: Structuring For Scale, Responsiveness, and Innovation

To succeed on a global scale, businesses should focus on a trio of key elements.

A Threat Analysis of RFID Passports
From Communications of the ACM

A Threat Analysis of RFID Passports

An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?

You Don't Know Jack About Software Maintenance
From Communications of the ACM

You Don't Know Jack About Software Maintenance

Long considered an afterthought, software maintenance is easiest and most effective when built into a system from the ground up.

Communications Surveillance: Privacy and Security at Risk
From Communications of the ACM

Communications Surveillance: Privacy and Security at Risk

As the sophistication of wiretapping technology grows, so too do the risks it poses to our privacy and security.

A Conversation with David E. Shaw
From Communications of the ACM

A Conversation with David E. Shaw

Stanford professor Pat Hanrahan sits down with the noted hedge fund founder, computational biochemist, and (above all) computer scientist.

Unifying Biological Image Formats with HDF5
From Communications of the ACM

Unifying Biological Image Formats with HDF5

The biosciences need an image format capable of high performance and long-term maintenance. Is HDF5 the answer?

Probing Biomolecular Machines with Graphics Processors
From Communications of the ACM

Probing Biomolecular Machines with Graphics Processors

GPU acceleration and other computer performance increases will offer critical benefits to biomedical science.

Browser Security
From Communications of the ACM

Browser Security: Lessons from Google Chrome

To shield the browser from attacks, Google Chrome developers eyed three key problems.

Hard-Disk Drives: The Good, the Bad, and the Ugly
From Communications of the ACM

Hard-Disk Drives: The Good, the Bad, and the Ugly

New drive technologies and increased capacities create new categories of failure modes that will influence system designs.

Security in the Browser
From Communications of the ACM

Security in the Browser

Users with no security training download Web browsers from the Internet without precaution, and demand that they be fast and easy to use. What can be done to make ...

Cybercrime 2.0
From Communications of the ACM

Cybercrime 2.0: When the Cloud Turns Dark

Web-based malware attacks are more insidious than ever. What can be done to stem the tide?

Erlang For Concurrent Programming
From Communications of the ACM

Erlang For Concurrent Programming

Designed for concurrency from the ground up, the Erlang language can be a valuable tool to help solve concurrent problems.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account