acm-header
Sign In

Communications of the ACM

Latest Practice



A Co-Relational Model of Data For Large Shared Data Banks
From Communications of the ACM

A Co-Relational Model of Data For Large Shared Data Banks

Contrary to popular belief, SQL and noSQL are really just two sides of the same coin.

Returning Control to the Programmer: SIMD Intrinsics For Virtual Machines
From Communications of the ACM

Returning Control to the Programmer: SIMD Intrinsics For Virtual Machines

Exposing SIMD units within interpreted languages could simplify programs and unleash floods of untapped processor power.

B.Y.O.C (1,342 Times and Counting)
From Communications of the ACM

B.Y.O.C (1,342 Times and Counting)

Why can't we all use standard libraries for commonly needed algorithms?

Testable System Administration
From Communications of the ACM

Testable System Administration

As we progress into an information age, humans will need to work less like the machines they use and embrace...

Finding Usability Bugs with Automated Tests
From Communications of the ACM

Finding Usability Bugs with Automated Tests

Ideally, all software should be easy to use and accessible for a wide range of people. However, software often falls short of these basic goals. We therefore need...

Virtualization: Blessing or Curse?
From Communications of the ACM

Virtualization: Blessing or Curse?

Managing virtualization at a large scale is fraught with hidden challenges.

UX Design and Agile: A Natural Fit?
From Communications of the ACM

UX Design and Agile: A Natural Fit?

Talking with Julian Gosper, Jean-Luc Agathos, Richard Rutter, and Terry Coatta.

Keeping Bits Safe: How Hard Can It Be?
From Communications of the ACM

Keeping Bits Safe: How Hard Can It Be?

As storage systems grow larger and larger, protecting their data for long-term storage is becoming ever more challenging.

The Case Against Data Lock-In
From Communications of the ACM

The Case Against Data Lock-In

Want to keep your users? Just make it easy for them to leave.

Tackling Architectural Complexity with Modeling
From Communications of the ACM

Tackling Architectural Complexity with Modeling

Component models can help diagnose architectural problems in both new and existing systems.

Thinking Clearly About Performance, Part 2
From Communications of the ACM

Thinking Clearly About Performance, Part 2

More important principles to keep in mind when designing high-performance software.

Thinking Clearly About Performance, Part 1
From Communications of the ACM

Thinking Clearly About Performance, Part 1

Improving the performance of complex software is difficult, but understanding some fundamental principles can make it easier.

Computers in Patient Care: The Promise and the Challenge
From Communications of the ACM

Computers in Patient Care: The Promise and the Challenge

Information technology has the potential to radically transform health care. Why has progress been so slow?

Seven Principles For Selecting Software Packages
From Communications of the ACM

Seven Principles For Selecting Software Packages

Everything you always wanted to know but were afraid to ask about the decision-making process.

Moving to the Edge: A CTO Roundtable on Network Virtualization
From Communications of the ACM

Moving to the Edge: A CTO Roundtable on Network Virtualization

Leading experts debate how virtualization and clouds impact network service architectures.

Software Development with Code Maps
From Communications of the ACM

Software Development with Code Maps

Could ubiquitous hand-drawn code map diagrams become a thing of the past?

You're Doing It Wrong
From Communications of the ACM

You're Doing It Wrong

Think you've mastered the art of server performance? Think again.

The Ideal HPC Programming Language
From Communications of the ACM

The Ideal HPC Programming Language

Maybe it's Fortran. Or maybe it just doesn't matter.

Simplicity Betrayed
From Communications of the ACM

Simplicity Betrayed

Emulating a video system shows how even a simple interface can be more complex—and capable—than it appears.

Securing Elasticity in the Cloud
From Communications of the ACM

Securing Elasticity in the Cloud

Elastic computing has great potential, but many security challenges remain.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account