acm-header
Sign In

Communications of the ACM

Latest Practice



A Decade of OS Access-Control Extensibility
From Communications of the ACM

A Decade of OS Access-Control Extensibility

Open source security foundations for mobile and embedded devices.

Browser Security
From Communications of the ACM

Browser Security: Appearances Can Be Deceiving

A discussion with Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil

The Web Won't Be Safe or Secure Until We Break It
From Communications of the ACM

The Web Won't Be Safe or Secure Until We Break It

Unless you have taken very particular precautions, assume every website you visit knows exactly who you are.

Sender-Side Buffers and the Case For Multimedia Adaptation
From Communications of the ACM

Sender-Side Buffers and the Case For Multimedia Adaptation

A proposal to improve the performance and availability of streaming video and other time-sensitive media.

Anatomy of a Solid-State Drive
From Communications of the ACM

Anatomy of a Solid-State Drive

While the ubiquitous SSD shares many features with the hard-disk drive, under the surface they are completely different.

Resilience Engineering
From Communications of the ACM

Resilience Engineering: Learning to Embrace Failure

A discussion with Jesse Robbins, Kripa Krishnan, John Allspaw, and Tom Limoncelli.

Weathering the Unexpected
From Communications of the ACM

Weathering the Unexpected

Failures happen, and resilience drills help organizations prepare for them.

Disks from the Perspective of a File System
From Communications of the ACM

Disks from the Perspective of a File System

Disks lie. And the controllers that run them are partners in crime.

Toward Higher Precision
From Communications of the ACM

Toward Higher Precision

An introduction to PTP and its significance to NTP practitioners.

Fault Injection in Production
From Communications of the ACM

Fault Injection in Production

Making the case for resilience testing.

All Your Database Are Belong To Us
From Communications of the ACM

All Your Database Are Belong To Us

In the big open world of the cloud, highly available distributed objects will rule.

Openflow: A Radical New Idea in Networking
From Communications of the ACM

Openflow: A Radical New Idea in Networking

An open standard that enables software-defined networking.

Controlling Queue Delay
From Communications of the ACM

Controlling Queue Delay

Active queue management is just one piece of the solution to persistently full buffers.

A Guided Tour of Data-Center Networking
From Communications of the ACM

A Guided Tour of Data-Center Networking

A good user experience depends on predictable performance within the data-center network.

Modeling People and Places with Internet Photo Collections
From Communications of the ACM

Modeling People and Places with Internet Photo Collections

Understanding the world from the sea of online photos.

Idempotence Is Not a Medical Condition
From Communications of the ACM

Idempotence Is Not a Medical Condition

Messages may be retried. Idempotence means that's OK.

Your Mouse Is a Database
From Communications of the ACM

Your Mouse Is a Database

Web and mobile applications are increasingly composed of asynchronous and real-time streaming services and push notifications.

CPU DB: Recording Microprocessor History
From Communications of the ACM

CPU DB: Recording Microprocessor History

With the open CPU DB database, you can mine microprocessor trends over the past 40 years.

SAGE: Whitebox Fuzzing For Security Testing
From Communications of the ACM

SAGE: Whitebox Fuzzing For Security Testing

SAGE has had a remarkable impact at Microsoft.

Revisiting Network I/O APIs
From Communications of the ACM

Revisiting Network I/O APIs: The Netmap Framework

It is possible to achieve huge performance improvements in the way packet processing is done on modern operating systems.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account