acm-header
Sign In

Communications of the ACM

Latest Practice



To PiM or Not to PiM
From Communications of the ACM

To PiM or Not to PiM

The case for in-memory inferencing of quantized CNNs at the edge.

Taking Flight with Copilot
From Communications of the ACM

Taking Flight with Copilot

Early insights and opportunities of AI-powered pair-programming tools.

Reinventing Backend Subsetting at Google
From Communications of the ACM

Reinventing Backend Subsetting at Google

Designing an algorithm with reduced connection churn that could replace deterministic subsetting.

Research for Practice: The Fun in Fuzzing
From Communications of the ACM

Research for Practice: The Fun in Fuzzing

The debugging technique comes into its own.

OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-Program Specialization
From Communications of the ACM

OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-Program Specialization

Leveraging scalable pointer analysis, value analysis, and dynamic analysis.

Mapping the Privacy Landscape for Central Bank Digital Currencies
From Communications of the ACM

Mapping the Privacy Landscape for Central Bank Digital Currencies

Now is the time to shape what future payment flows will reveal about you.

Research for Practice: Crash Consistency
From Communications of the ACM

Research for Practice: Crash Consistency

Keeping data safe in the presence of crashes is a fundamental problem.

FHIR
From Communications of the ACM

FHIR: Reducing Friction in the Exchange of Healthcare Data

A discussion with James Agnew, Pat Helland, and Adam Cole.

CSRB's Opus One
From Communications of the ACM

CSRB's Opus One

Comments on the Cyber Safety Review Board Log4j Event Report.

Research for Practice: Convergence
From Communications of the ACM

Research for Practice: Convergence

The return of a popular feature that shares the joy and utility of reading CS research between academics and their counterparts in industry.

Linear Address Spaces
From Communications of the ACM

Linear Address Spaces

Unsafe at any speed.

Middleware 101
From Communications of the ACM

Middleware 101

What to know now and for the future.

Persistence Programming
From Communications of the ACM

Persistence Programming

Are we doing this right?

FPGAs in Client Compute Hardware
From Communications of the ACM

FPGAs in Client Compute Hardware

Despite certain challenges, FPGAs provide security and performance benefits over ASICs.

Surveillance Too Cheap to Meter
From Communications of the ACM

Surveillance Too Cheap to Meter

Stopping Big Brother would require an expensive overhaul of the entire system.

The Software Industry Is <i>Still</i> the Problem
From Communications of the ACM

The Software Industry Is Still the Problem

The time is (also) way overdue for IT professional liability.

Lamboozling Attackers
From Communications of the ACM

Lamboozling Attackers: A New Generation of Deception

Software engineering teams can exploit attackers' human nature by building deception environments.

It Takes a Community
From Communications of the ACM

It Takes a Community: The Open Source Challenge

A discussion with Reynold Xin, Wes McKinney, Alan Gates, and Chris McCubbin.

Meaning and Context in Computer Programs
From Communications of the ACM

Meaning and Context in Computer Programs

Sharing domain knowledge among programmers using the source code as the medium.

A Conversation with Margo Seltzer and Mike Olson
From Communications of the ACM

A Conversation with Margo Seltzer and Mike Olson

The history of Berkeley DB.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account