acm-header
Sign In

Communications of the ACM

Latest Practice



Designing UIs for Static-Analysis Tools
From Communications of the ACM

Designing UIs for Static-Analysis Tools

Evaluating tool design guidelines with SWAN.

Digging into Big Provenance (with SPADE)
From Communications of the ACM

Digging into Big Provenance (with SPADE)

A user interface for querying provenance.

A New Era for Mechanical CAD
From Communications of the ACM

A New Era for Mechanical CAD

Time to move forward from decades-old design.

The Complex Path to Quantum Resistance
From Communications of the ACM

The Complex Path to Quantum Resistance

Is your organization prepared?

WebRTC
From Communications of the ACM

WebRTC: Real-Time Communication for the Open Web Platform

What was once a way to bring audio and video to the Web has expanded into more use cases than we could ever imagine.

Always-on Time-Series Database
From Communications of the ACM

Always-on Time-Series Database: Keeping Up Where There's No Way to Catch Up

A discussion with Theo Schlossnagle, Justin Sheehy, and Chris McCubbin.

The SPACE of Developer Productivity
From Communications of the ACM

The SPACE of Developer Productivity

There's more to it than you think.

Enclaves in the Clouds
From Communications of the ACM

Enclaves in the Clouds

Legal considerations and broader implications

Out-of-This-World Additive Manufacturing
From Communications of the ACM

Out-of-This-World Additive Manufacturing

From thingamabobs to rockets, 3D printing takes many forms.

Differential Privacy
From Communications of the ACM

Differential Privacy: The Pursuit of Protections by Default

A discussion with Miguel Guevara, Damien Desfontaines, Jim Waldo, and Terry Coatta

The Time I Stole $10,000 from Bell Labs
From Communications of the ACM

The Time I Stole $10,000 from Bell Labs

Why DevOps encourages us to celebrate outages.

The Life of a Data Byte
From Communications of the ACM

The Life of a Data Byte

Be kind and rewind.

Five Nonobvious Remote Work Techniques
From Communications of the ACM

Five Nonobvious Remote Work Techniques

Emulating the efficiency of in-person conversations.

Dark Patterns
From Communications of the ACM

Dark Patterns: Past, Present, and Future

The evolution of tricky user interfaces.

Is Persistent Memory Persistent?
From Communications of the ACM

Is Persistent Memory Persistent?

A simple and inexpensive test of failure-atomic update mechanisms.

Demystifying Stablecoins
From Communications of the ACM

Demystifying Stablecoins

Cryptography meets monetary policy.

Communicate Using the Numbers 1, 2, 3, and More
From Communications of the ACM

Communicate Using the Numbers 1, 2, 3, and More

Leveraging expectations for better communication.

Managing the Hidden Costs of Coordination
From Communications of the ACM

Managing the Hidden Costs of Coordination

Controlling coordination costs when multiple, distributed perspectives are essential.

Cognitive Work of Hypothesis Exploration During Anomaly Response
From Communications of the ACM

Cognitive Work of Hypothesis Exploration During Anomaly Response

A look at how we respond to the unexpected.

The Reliability of Enterprise Applications
From Communications of the ACM

The Reliability of Enterprise Applications

Understanding enterprise reliability.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account