acm-header
Sign In

Communications of the ACM

Latest Practice



National Internet Defense - Small States on the Skirmish Line
From Communications of the ACM

National Internet Defense - Small States on the Skirmish Line

Despite the global and borderless nature of the Internet's underlying protocols and driving philosophy, there are significant ways in which it remains substantively...

Virtualization: Blessing or Curse?
From Communications of the ACM

Virtualization: Blessing or Curse?

Managing virtualization at a large scale is fraught with hidden challenges.

Thinking Clearly About Performance, Part 2
From Communications of the ACM

Thinking Clearly About Performance, Part 2

More important principles to keep in mind when designing high-performance software.

Photoshop Scalability: Keeping It Simple
From Communications of the ACM

Photoshop Scalability: Keeping It Simple

Clem Cole and Russell Williams discuss Photoshop's long history with parallelism, and what is now seen as the chief challenge.

Thinking Clearly About Performance, Part 1
From Communications of the ACM

Thinking Clearly About Performance, Part 1

Improving the performance of complex software is difficult, but understanding some fundamental principles can make it easier.

Injecting Errors For Fun and Profit
From Communications of the ACM

Injecting Errors For Fun and Profit

Error-detection and correction features are only as good as our ability to test them.

Moving to the Edge: A CTO Roundtable on Network Virtualization
From Communications of the ACM

Moving to the Edge: A CTO Roundtable on Network Virtualization

Leading experts debate how virtualization and clouds impact network service architectures.

You're Doing It Wrong
From Communications of the ACM

You're Doing It Wrong

Think you've mastered the art of server performance? Think again.

Why Cloud Computing Will Never Be Free
From Communications of the ACM

Why Cloud Computing Will Never Be Free

The competition among cloud providers may drive prices downward, but at what cost?

Principles of Robust Timing Over the Internet
From Communications of the ACM

Principles of Robust Timing Over the Internet

The key to synchronizing clocks over networks is taming delay variability.

A View of Cloud Computing
From Communications of the ACM

A View of Cloud Computing

Clearing the clouds away from the true potential and obstacles posed by this computing capability.

Cooling the Data Center
From Communications of the ACM

Cooling the Data Center

What can be done to make cooling systems in data centers more energy efficient?

Toward Energy-Efficient Computing
From Communications of the ACM

Toward Energy-Efficient Computing

What will it take to make server-side computing more energy efficient?

Managing Contention For Shared Resources on Multicore Processors
From Communications of the ACM

Managing Contention For Shared Resources on Multicore Processors

Contention for caches, memory controllers, and interconnects can be eased by contention-aware scheduling algorithms.

Power-Efficient Software
From Communications of the ACM

Power-Efficient Software

Power-manageable hardware can help save energy, but what can software developers do to address the problem?

Triple-Parity RAID and Beyond
From Communications of the ACM

Triple-Parity RAID and Beyond

As hard-drive capacities continue to outpace their throughput, the time has come for a new level of RAID.

Maximizing Power Efficiency with Asymmetric Multicore Systems
From Communications of the ACM

Maximizing Power Efficiency with Asymmetric Multicore Systems

How do we develop software to make the most of the promise that asymmetric multicore systems use a lot less energy?

What DNS Is Not
From Communications of the ACM

What DNS Is Not

DNS is many things to many people — perhaps too many things to too many people.

A Threat Analysis of RFID Passports
From Communications of the ACM

A Threat Analysis of RFID Passports

An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?

Four Billion Little Brothers?
From Communications of the ACM

Four Billion Little Brothers?: Privacy, Mobile Phones, and Ubiquitous Data Collection

Participatory sensing technologies could improve our lives and our communities, but at what cost to our privacy?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account