Latest Practice
From Communications of the ACM
Reliability in the face of rapid change
Ben Maurer From Communications of the ACM | November 2015
From Communications of the ACM
Rethinking the fundamental abstractions of the file system.
T. S. Pillai, V. Chidambaram, R. Alagappan, S. Al-Kiswany, A. C. Arpaci-Dusseau, R. H. Arpaci-Dusseau From Communications of the ACM | October 2015
From Communications of the ACM
We have to choose to build a Web that is accessible to everyone.
Rich Harris From Communications of the ACM | October 2015
From Communications of the ACM
Old questions being answered with both AI and HCI.
Spence Green, Jeffrey Heer, Christopher D. Manning From Communications of the ACM | September 2015
From Communications of the ACM
Use states to drive your tests.
Arie van Deursen From Communications of the ACM | August 2015
From Communications of the ACM
Cloud computing for computer scientists.
Daniel C. Wang From Communications of the ACM | August 2015
From Communications of the ACM
The finance industry has unique demands for low-latency distributed systems.
Andrew Brook From Communications of the ACM | July 2015
From Communications of the ACM
Lessons learned managing a data science research team.
Kate Matsudaira From Communications of the ACM | June 2015
From Communications of the ACM
In the end, dynamic systems are simply less secure.
Paul Vixie From Communications of the ACM | April 2015
From Communications of the ACM
The perpetual motion of parallel performance.
Neil J. Gunther, Paul Puglia, Kristofer Tomasette From Communications of the ACM | April 2015
From Communications of the ACM
Bad protocol, bad politics.
Poul-Henning Kamp From Communications of the ACM | March 2015
From Communications of the ACM
Crackers discover how to use NTP as a weapon for abuse.
Harlan Stenn From Communications of the ACM | February 2015
From Communications of the ACM
MBT has positive effects on efficiency and effectiveness, even if it only partially fulfills high expectations.
Robert V. Binder, Bruno Legeard, Anne Kramer From Communications of the ACM | February 2015
From Communications of the ACM
Designing locking primitives with performance in mind.
Davidlohr Bueso From Communications of the ACM | January 2015
From Communications of the ACM
Use the database built for your access model.
Rick Richardson From Communications of the ACM | January 2015
From Communications of the ACM
And the belief in such a device is harmful.
David Chisnall From Communications of the ACM | December 2014
From Communications of the ACM
What happened to the promise of rigorous, disciplined, professional practices for software development?
Ivar Jacobson, Ed Seidewitz From Communications of the ACM | December 2014
From Communications of the ACM
Public, verifiable, append-only logs.
Ben Laurie From Communications of the ACM | October 2014
From Communications of the ACM
Assessing legal and technical solutions to secure HTTPS.
Axel Arnbak, Hadi Asghari, Michel Van Eeten, Nico Van Eijk From Communications of the ACM | October 2014
From Communications of the ACM
Routing security incidents can still slip past deployed security defenses.
Sharon Goldberg From Communications of the ACM | October 2014