acm-header
Sign In

Communications of the ACM

Latest Practice



The Reliability of Enterprise Applications
From Communications of the ACM

The Reliability of Enterprise Applications

Understanding enterprise reliability.

Space Time Discontinuum
From Communications of the ACM

Space Time Discontinuum

Combining data from many sources may cause painful delays.

Hack for Hire
From Communications of the ACM

Hack for Hire

Investigating the emerging black market of retail email account hacking services.

API Practices If You Hate Your Customers
From Communications of the ACM

API Practices If You Hate Your Customers

Application programming interfaces speak louder than words.

Write Amplification vs. Read Perspiration
From Communications of the ACM

Write Amplification vs. Read Perspiration

The trade-offs between write and read.

Open Source Firmware
From Communications of the ACM

Open Source Firmware

Step into the world behind the kernel.

Demo Data as Code
From Communications of the ACM

Demo Data as Code

Automation helps collaboration.

Extract, Shoehorn, and Load
From Communications of the ACM

Extract, Shoehorn, and Load

Data doesn't always fit nicely into a new home.

Access Controls and Healthcare Records
From Communications of the ACM

Access Controls and Healthcare Records: Who Owns the Data?

A discussion with David Evans, Richard McDonald, and Terry Coatta.

Achieving Digital Permanence
From Communications of the ACM

Achieving Digital Permanence

The many challenges to maintaining stored information and ways to overcome them.

Online Event Processing
From Communications of the ACM

Online Event Processing

Achieving consistency where distributed transactions have failed.

Net Neutrality
From Communications of the ACM

Net Neutrality: Unexpected Solution to Blockchain Scaling

Cloud-delivery networks could dramatically improve blockchains' scalability, but clouds must be provably neutral first.

A Hitchhiker's Guide to the Blockchain Universe
From Communications of the ACM

A Hitchhiker's Guide to the Blockchain Universe

Blockchain remains a mystery, despite its growing acceptance.

Understanding Database Reconstruction Attacks on Public Data
From Communications of the ACM

Understanding Database Reconstruction Attacks on Public Data

These attacks on statistical databases are no longer a theoretical danger.

CodeFlow
From Communications of the ACM

CodeFlow: Improving the Code Review Process at Microsoft

A discussion with Jacek Czerwonka, Michaela Greiler, Christian Bird, Lucas Panjer, and Terry Coatta

SQL Is No Excuse to Avoid DevOps
From Communications of the ACM

SQL Is No Excuse to Avoid DevOps

Automation and a little discipline allow better testing, shorter release cycles, and reduced business risk.

Corp to Cloud: Google's Virtual Desktops
From Communications of the ACM

Corp to Cloud: Google's Virtual Desktops

How Google moved its virtual desktops to the cloud.

Mind Your State for Your State of Mind
From Communications of the ACM

Mind Your State for Your State of Mind

The interactions between storage and applications can be complex and subtle.

GitOps
From Communications of the ACM

GitOps: A Path to More Self-Service IT

IaC + PR = GitOps

Workload Frequency Scaling Law
From Communications of the ACM

Workload Frequency Scaling Law: Derivation and Verification

Workload scalability has a cascade relation via the scale factor.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account