acm-header
Sign In

Communications of the ACM

Latest Practice



The Hyperdimensional Tar Pit
From Communications of the ACM

The Hyperdimensional Tar Pit

Make a guess, double the number, and then move to the next larger unit of time.

Bufferbloat: What's Wrong With the Internet?
From Communications of the ACM

Bufferbloat: What's Wrong With the Internet?

A discussion with Vint Cerf, Van Jacobson, Nick Weaver, and Jim Gettys.

You Don't Know Jack About Shared Variables or Memory Models
From Communications of the ACM

You Don't Know Jack About Shared Variables or Memory Models

Data races are evil.

Advances and Challenges in Log Analysis
From Communications of the ACM

Advances and Challenges in Log Analysis

Logs contain a wealth of information to help manage systems.

Bufferbloat
From Communications of the ACM

Bufferbloat: Dark Buffers in the Internet

Networks without effective AQM may again be vulnerable to congestion collapse.

How Will Astronomy Archives Survive the Data Tsunami?
From Communications of the ACM

How Will Astronomy Archives Survive the Data Tsunami?

Astronomers are collecting more data than ever. What practices can keep them ahead of the flood?

The Software Industry <i>is</i> the Problem
From Communications of the ACM

The Software Industry is the Problem

The time has come for software liability laws.

Abstraction in Hardware System Design
From Communications of the ACM

Abstraction in Hardware System Design

Applying lessons from software languages to hardware languages using Bluespec SystemVerilog.

ACM CTO Roundtable on Mobile Devices in the Enterprise
From Communications of the ACM

ACM CTO Roundtable on Mobile Devices in the Enterprise

Finding solutions as growth and fragmentation complicate mobile device support.

The Most Expensive One-Byte Mistake
From Communications of the ACM

The Most Expensive One-Byte Mistake

Did Ken, Dennis, and Brian choose wrong with NUL-terminated text strings?

Arrogance in Business Planning
From Communications of the ACM

Arrogance in Business Planning

Technology business plans that assume no competition — ever.

The Robustness Principle Reconsidered
From Communications of the ACM

The Robustness Principle Reconsidered

In 1981, Jon Postel formulated the Robustness Principle. Although described for implementations of TCP, it was quickly accepted as a...

Computing Without Processors
From Communications of the ACM

Computing Without Processors

Heterogeneous systems allow us to target our programming to the appropriate environment.

The Pain of Implementing LINQ Providers
From Communications of the ACM

The Pain of Implementing LINQ Providers

It's no easy task for NoSQL.

Passing a Language Through the Eye of a Needle
From Communications of the ACM

Passing a Language Through the Eye of a Needle

How the embeddability of Lua impacted its design.

If You Have Too Much Data, Then 'Good Enough' Is Good Enough
From Communications of the ACM

If You Have Too Much Data, Then 'Good Enough' Is Good Enough

In today's humongous database systems, clarity may be relaxed, but business needs can still be met.

Scalable SQL
From Communications of the ACM

Scalable SQL

How do large-scale sites and applications remain SQL-based?

Does Deterrence Work in Reducing Information Security Policy Abuse By Employees?
From Communications of the ACM

Does Deterrence Work in Reducing Information Security Policy Abuse By Employees?

Methods for evaluating and effectively managing the security behavior of employees.

The One-Second War
From Communications of the ACM

The One-Second War

Finding a lasting solution to the leap seconds problem has become increasingly urgent.

Weapons of Mass Assignment
From Communications of the ACM

Weapons of Mass Assignment

A Ruby on Rails app highlights some serious, yet easily avoided, security vulnerabilities.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account