acm-header
Sign In

Communications of the ACM

Latest Practice



Fault Injection in Production
From Communications of the ACM

Fault Injection in Production

Making the case for resilience testing.

All Your Database Are Belong To Us
From Communications of the ACM

All Your Database Are Belong To Us

In the big open world of the cloud, highly available distributed objects will rule.

Openflow: A Radical New Idea in Networking
From Communications of the ACM

Openflow: A Radical New Idea in Networking

An open standard that enables software-defined networking.

Controlling Queue Delay
From Communications of the ACM

Controlling Queue Delay

Active queue management is just one piece of the solution to persistently full buffers.

A Guided Tour of Data-Center Networking
From Communications of the ACM

A Guided Tour of Data-Center Networking

A good user experience depends on predictable performance within the data-center network.

Idempotence Is Not a Medical Condition
From Communications of the ACM

Idempotence Is Not a Medical Condition

Messages may be retried. Idempotence means that's OK.

Your Mouse Is a Database
From Communications of the ACM

Your Mouse Is a Database

Web and mobile applications are increasingly composed of asynchronous and real-time streaming services and push notifications.

Revisiting Network I/O APIs
From Communications of the ACM

Revisiting Network I/O APIs: The Netmap Framework

It is possible to achieve huge performance improvements in the way packet processing is done on modern operating systems.

Bufferbloat: What's Wrong With the Internet?
From Communications of the ACM

Bufferbloat: What's Wrong With the Internet?

A discussion with Vint Cerf, Van Jacobson, Nick Weaver, and Jim Gettys.

You Don't Know Jack About Shared Variables or Memory Models
From Communications of the ACM

You Don't Know Jack About Shared Variables or Memory Models

Data races are evil.

Bufferbloat
From Communications of the ACM

Bufferbloat: Dark Buffers in the Internet

Networks without effective AQM may again be vulnerable to congestion collapse.

Abstraction in Hardware System Design
From Communications of the ACM

Abstraction in Hardware System Design

Applying lessons from software languages to hardware languages using Bluespec SystemVerilog.

ACM CTO Roundtable on Mobile Devices in the Enterprise
From Communications of the ACM

ACM CTO Roundtable on Mobile Devices in the Enterprise

Finding solutions as growth and fragmentation complicate mobile device support.

The Most Expensive One-Byte Mistake
From Communications of the ACM

The Most Expensive One-Byte Mistake

Did Ken, Dennis, and Brian choose wrong with NUL-terminated text strings?

The Robustness Principle Reconsidered
From Communications of the ACM

The Robustness Principle Reconsidered

In 1981, Jon Postel formulated the Robustness Principle. Although described for implementations of TCP, it was quickly accepted as a...

Computing Without Processors
From Communications of the ACM

Computing Without Processors

Heterogeneous systems allow us to target our programming to the appropriate environment.

Does Deterrence Work in Reducing Information Security Policy Abuse By Employees?
From Communications of the ACM

Does Deterrence Work in Reducing Information Security Policy Abuse By Employees?

Methods for evaluating and effectively managing the security behavior of employees.

A Co-Relational Model of Data For Large Shared Data Banks
From Communications of the ACM

A Co-Relational Model of Data For Large Shared Data Banks

Contrary to popular belief, SQL and noSQL are really just two sides of the same coin.

Successful Strategies For IPv6 Rollouts. Really.
From Communications of the ACM

Successful Strategies For IPv6 Rollouts. Really.

Knowing where to begin is half the battle.

Returning Control to the Programmer: SIMD Intrinsics For Virtual Machines
From Communications of the ACM

Returning Control to the Programmer: SIMD Intrinsics For Virtual Machines

Exposing SIMD units within interpreted languages could simplify programs and unleash floods of untapped processor power.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account