acm-header
Sign In

Communications of the ACM

Latest Practice



Seven Principles For Selecting Software Packages
From Communications of the ACM

Seven Principles For Selecting Software Packages

Everything you always wanted to know but were afraid to ask about the decision-making process.

Software Development with Code Maps
From Communications of the ACM

Software Development with Code Maps

Could ubiquitous hand-drawn code map diagrams become a thing of the past?

Visualizing System Latency
From Communications of the ACM

Visualizing System Latency

Heat maps are a unique and powerful way to visualize latency data. Explaining the results, however, is an ongoing challenge.

A Tour Through the Visualization Zoo
From Communications of the ACM

A Tour Through the Visualization Zoo

A survey of powerful visualization techniques, from the obvious to the obscure.

Securing Elasticity in the Cloud
From Communications of the ACM

Securing Elasticity in the Cloud

Elastic computing has great potential, but many security challenges remain.

Why Cloud Computing Will Never Be Free
From Communications of the ACM

Why Cloud Computing Will Never Be Free

The competition among cloud providers may drive prices downward, but at what cost?

Principles of Robust Timing Over the Internet
From Communications of the ACM

Principles of Robust Timing Over the Internet

The key to synchronizing clocks over networks is taming delay variability.

Triple-Parity RAID and Beyond
From Communications of the ACM

Triple-Parity RAID and Beyond

As hard-drive capacities continue to outpace their throughput, the time has come for a new level of RAID.

Other People's Data
From Communications of the ACM

Other People's Data

Companies have access to more types of external data than ever before. How can they integrate it most effectively?

Data in Flight
From Communications of the ACM

Data in Flight

How streaming SQL technology can help solve the Web 2.0 data crunch.

Four Billion Little Brothers?
From Communications of the ACM

Four Billion Little Brothers?: Privacy, Mobile Phones, and Ubiquitous Data Collection

Participatory sensing technologies could improve our lives and our communities, but at what cost to our privacy?

A Conversation with David E. Shaw
From Communications of the ACM

A Conversation with David E. Shaw

Stanford professor Pat Hanrahan sits down with the noted hedge fund founder, computational biochemist, and (above all) computer scientist.

Unifying Biological Image Formats with HDF5
From Communications of the ACM

Unifying Biological Image Formats with HDF5

The biosciences need an image format capable of high performance and long-term maintenance. Is HDF5 the answer?

Probing Biomolecular Machines with Graphics Processors
From Communications of the ACM

Probing Biomolecular Machines with Graphics Processors

GPU acceleration and other computer performance increases will offer critical benefits to biomedical science.

Making Sense of Revision-Control Systems
From Communications of the ACM

Making Sense of Revision-Control Systems

All revision-control systems come with complicated sets of trade-offs. How do you find the best match between tool and team?

Monitoring and Control of Large Systems With MonALISA
From Communications of the ACM

Monitoring and Control of Large Systems With MonALISA

MonALISA developers describe how it works, the key design principles behind it, and the biggest technical challenges in building it.

Reveling in Constraints
From Communications of the ACM

Reveling in Constraints

The Google Web Toolkit is an end-run around Web development obstacles.

The Pathologies of Big Data
From Communications of the ACM

The Pathologies of Big Data

Scale up your datasets enough and your apps come undone. What are the typical problems and where do the bottlenecks surface?

Browser Security
From Communications of the ACM

Browser Security: Lessons from Google Chrome

To shield the browser from attacks, Google Chrome developers eyed three key problems.

The Five-Minute Rule 20 Years Later
From Communications of the ACM

The Five-Minute Rule 20 Years Later

Revisiting Gray and Putzolu's famous rule in the age of Flash.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account