acm-header
Sign In

Communications of the ACM

Latest Practice



The Most Expensive One-Byte Mistake
From Communications of the ACM

The Most Expensive One-Byte Mistake

Did Ken, Dennis, and Brian choose wrong with NUL-terminated text strings?

Arrogance in Business Planning
From Communications of the ACM

Arrogance in Business Planning

Technology business plans that assume no competition — ever.

The Robustness Principle Reconsidered
From Communications of the ACM

The Robustness Principle Reconsidered

In 1981, Jon Postel formulated the Robustness Principle. Although described for implementations of TCP, it was quickly accepted as a...

Computing Without Processors
From Communications of the ACM

Computing Without Processors

Heterogeneous systems allow us to target our programming to the appropriate environment.

The Pain of Implementing LINQ Providers
From Communications of the ACM

The Pain of Implementing LINQ Providers

It's no easy task for NoSQL.

Passing a Language Through the Eye of a Needle
From Communications of the ACM

Passing a Language Through the Eye of a Needle

How the embeddability of Lua impacted its design.

DSL For the Uninitiated
From Communications of the ACM

DSL For the Uninitiated

Domain-specific languages bridge the semantic gap in programming.

Microsoft's Protocol Documentation Program
From Communications of the ACM

Microsoft's Protocol Documentation Program: Interoperability Testing at Scale

A discussion with Nico Kicillof, Wolfgang Grieskamp, and Bob Binder.

If You Have Too Much Data, Then 'Good Enough' Is Good Enough
From Communications of the ACM

If You Have Too Much Data, Then 'Good Enough' Is Good Enough

In today's humongous database systems, clarity may be relaxed, but business needs can still be met.

Does Deterrence Work in Reducing Information Security Policy Abuse By Employees?
From Communications of the ACM

Does Deterrence Work in Reducing Information Security Policy Abuse By Employees?

Methods for evaluating and effectively managing the security behavior of employees.

The One-Second War
From Communications of the ACM

The One-Second War

Finding a lasting solution to the leap seconds problem has become increasingly urgent.

Mobile Application Development
From Communications of the ACM

Mobile Application Development: Web vs. Native

Web apps are cheaper to develop and deploy than native apps, but can they match the native user experience?

Weapons of Mass Assignment
From Communications of the ACM

Weapons of Mass Assignment

A Ruby on Rails app highlights some serious, yet easily avoided, security vulnerabilities.

A Co-Relational Model of Data For Large Shared Data Banks
From Communications of the ACM

A Co-Relational Model of Data For Large Shared Data Banks

Contrary to popular belief, SQL and noSQL are really just two sides of the same coin.

Successful Strategies For IPv6 Rollouts. Really.
From Communications of the ACM

Successful Strategies For IPv6 Rollouts. Really.

Knowing where to begin is half the battle.

Returning Control to the Programmer: SIMD Intrinsics For Virtual Machines
From Communications of the ACM

Returning Control to the Programmer: SIMD Intrinsics For Virtual Machines

Exposing SIMD units within interpreted languages could simplify programs and unleash floods of untapped processor power.

B.Y.O.C (1,342 Times and Counting)
From Communications of the ACM

B.Y.O.C (1,342 Times and Counting)

Why can't we all use standard libraries for commonly needed algorithms?

National Internet Defense - Small States on the Skirmish Line
From Communications of the ACM

National Internet Defense - Small States on the Skirmish Line

Despite the global and borderless nature of the Internet's underlying protocols and driving philosophy, there are significant ways in which it remains substantively...

Testable System Administration
From Communications of the ACM

Testable System Administration

As we progress into an information age, humans will need to work less like the machines they use and embrace...

System Administration Soft Skills
From Communications of the ACM

System Administration Soft Skills

How can system administrators reduce stress and conflict in the workplace?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account