acm-header
Sign In

Communications of the ACM

Latest Practice



HTTP/2.0
From Communications of the ACM

HTTP/2.0: The IETF Is Phoning It In

Bad protocol, bad politics.

Meta II
From Communications of the ACM

Meta II: Digital Vellum in the Digital Scriptorium

Revisiting Schorre's 1962 compiler-compiler.

Securing Network Time Protocol
From Communications of the ACM

Securing Network Time Protocol

Crackers discover how to use NTP as a weapon for abuse.

Model-Based Testing
From Communications of the ACM

Model-Based Testing: Where Does It Stand?

MBT has positive effects on efficiency and effectiveness, even if it only partially fulfills high expectations.

Scalability Techniques For Practical Synchronization Primitives
From Communications of the ACM

Scalability Techniques For Practical Synchronization Primitives

Designing locking primitives with performance in mind.

Internal Access Controls
From Communications of the ACM

Internal Access Controls

Trust, but verify.

Disambiguating Databases
From Communications of the ACM

Disambiguating Databases

Use the database built for your access model.

The Responsive Enterprise
From Communications of the ACM

The Responsive Enterprise: Embracing the Hacker Way

Soon every company will be a software company.

No Such Thing as a General-Purpose Processor
From Communications of the ACM

No Such Thing as a General-Purpose Processor

And the belief in such a device is harmful.

A New Software Engineering
From Communications of the ACM

A New Software Engineering

What happened to the promise of rigorous, disciplined, professional practices for software development?

A Decade of Progress in Parallel Programming Productivity
From Communications of the ACM

A Decade of Progress in Parallel Programming Productivity

Looking at the design and benefits of X10.

JavaScript and the Netflix User Interface
From Communications of the ACM

JavaScript and the Netflix User Interface

Conditional dependency resolution.

Certificate Transparency
From Communications of the ACM

Certificate Transparency

Public, verifiable, append-only logs.

Security Collapse in the HTTPS Market
From Communications of the ACM

Security Collapse in the HTTPS Market

Assessing legal and technical solutions to secure HTTPS.

Why Is It Taking So Long to Secure Internet Routing?
From Communications of the ACM

Why Is It Taking So Long to Secure Internet Routing?

Routing security incidents can still slip past deployed security defenses.

The Network Is Reliable
From Communications of the ACM

The Network Is Reliable

An informal survey of real-world communications failures.

Securing the Tangled Web
From Communications of the ACM

Securing the Tangled Web

Preventing script injection vulnerabilities through software design.

Bringing Arbitrary Compute to Authoritative Data
From Communications of the ACM

Bringing Arbitrary Compute to Authoritative Data

Many disparate use cases can be satisfied with a single storage system.

Undergraduate Software Engineering
From Communications of the ACM

Undergraduate Software Engineering

Addressing the needs of professional software development.

Automated QA Testing at Electronic Arts
From Communications of the ACM

Automated QA Testing at Electronic Arts

A discussion with Michael Donat, Jafar Husain, and Terry Coatta
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account