acm-header
Sign In

Communications of the ACM

Latest Practice



Immutability Changes Everything
From Communications of the ACM

Immutability Changes Everything

We need it, we can afford it, and the time is now.

Challenges of Memory Management on Modern N-UMA Systems
From Communications of the ACM

Challenges of Memory Management on Modern N-UMA Systems

Optimizing NUMA systems applications with Carrefour.

Fail at Scale
From Communications of the ACM

Fail at Scale

Reliability in the face of rapid change

Crash Consistency
From Communications of the ACM

Crash Consistency

Rethinking the fundamental abstractions of the file system.

From the EDVAC to WEBVACs
From Communications of the ACM

From the EDVAC to WEBVACs

Cloud computing for computer scientists.

Low-Latency Distributed Applications in Finance
From Communications of the ACM

Low-Latency Distributed Applications in Finance

The finance industry has unique demands for low-latency distributed systems.

Go Static or Go Home
From Communications of the ACM

Go Static or Go Home

In the end, dynamic systems are simply less secure.

Hadoop Superlinear Scalability
From Communications of the ACM

Hadoop Superlinear Scalability

The perpetual motion of parallel performance.

HTTP/2.0
From Communications of the ACM

HTTP/2.0: The IETF Is Phoning It In

Bad protocol, bad politics.

Securing Network Time Protocol
From Communications of the ACM

Securing Network Time Protocol

Crackers discover how to use NTP as a weapon for abuse.

Model-Based Testing
From Communications of the ACM

Model-Based Testing: Where Does It Stand?

MBT has positive effects on efficiency and effectiveness, even if it only partially fulfills high expectations.

Scalability Techniques For Practical Synchronization Primitives
From Communications of the ACM

Scalability Techniques For Practical Synchronization Primitives

Designing locking primitives with performance in mind.

No Such Thing as a General-Purpose Processor
From Communications of the ACM

No Such Thing as a General-Purpose Processor

And the belief in such a device is harmful.

Certificate Transparency
From Communications of the ACM

Certificate Transparency

Public, verifiable, append-only logs.

Why Is It Taking So Long to Secure Internet Routing?
From Communications of the ACM

Why Is It Taking So Long to Secure Internet Routing?

Routing security incidents can still slip past deployed security defenses.

The Network Is Reliable
From Communications of the ACM

The Network Is Reliable

An informal survey of real-world communications failures.

Securing the Tangled Web
From Communications of the ACM

Securing the Tangled Web

Preventing script injection vulnerabilities through software design.

Bringing Arbitrary Compute to Authoritative Data
From Communications of the ACM

Bringing Arbitrary Compute to Authoritative Data

Many disparate use cases can be satisfied with a single storage system.

Undergraduate Software Engineering
From Communications of the ACM

Undergraduate Software Engineering

Addressing the needs of professional software development.

Don't Settle For Eventual Consistency
From Communications of the ACM

Don't Settle For Eventual Consistency

Stronger properties for low-latency geo-replicated storage.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account