acm-header
Sign In

Communications of the ACM

Latest Practice



Improving Testing of Deep-Learning Systems
From Communications of the ACM

Improving Testing of Deep-Learning Systems

A combination of differential and mutation testing results in better test data.

Software Managers' Guide to Operational Excellence
From Communications of the ACM

Software Managers' Guide to Operational Excellence

The secret to being a great engineering leader? Setting up the right checks and balances.

Security Mismatch
From Communications of the ACM

Security Mismatch

Security must be a business enabler, not a hinderer.

Knowing What You Need to Know
From Communications of the ACM

Knowing What You Need to Know

Personal, team, and organizational effectiveness can be improved with a little preparation.

Confidential Computing: Elevating Cloud Security and Privacy
From Communications of the ACM

Confidential Computing: Elevating Cloud Security and Privacy

Working toward a more secure and innovative future.

Hardware VM Isolation in the Cloud
From Communications of the ACM

Hardware VM Isolation in the Cloud

Enabling confidential computing with AMD SEV-SNP technology.

Creating the First Confidential GPUs
From Communications of the ACM

Creating the First Confidential GPUs

The team at NVIDIA brings confidentiality and integrity to user code and data for accelerated computing.

Why Should I Trust Your Code?
From Communications of the ACM

Why Should I Trust Your Code?

Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.

Pointers in Far Memory
From Communications of the ACM

Pointers in Far Memory

Rethinking how data and computations should be organized.

How Flexible Is CXL's Memory Protection?
From Communications of the ACM

How Flexible Is CXL's Memory Protection?

Replacing a sledgehammer with a scalpel.

DevEX: What Actually Drives Productivity?
From Communications of the ACM

DevEX: What Actually Drives Productivity?

The developer-centric approach to measuring and improving productivity.

Beyond the Repository
From Communications of the ACM

Beyond the Repository

Best practices for open source ecosystems researchers.

Research for Practice: OS Scheduling
From Communications of the ACM

Research for Practice: OS Scheduling

Better scheduling policies for modern computing systems.

Opportunity Cost and Missed Chances in Optimizing Cybersecurity
From Communications of the ACM

Opportunity Cost and Missed Chances in Optimizing Cybersecurity

The loss of potential gain from other alternatives when one alternative is chosen.

To PiM or Not to PiM
From Communications of the ACM

To PiM or Not to PiM

The case for in-memory inferencing of quantized CNNs at the edge.

Taking Flight with Copilot
From Communications of the ACM

Taking Flight with Copilot

Early insights and opportunities of AI-powered pair-programming tools.

Research for Practice: The Fun in Fuzzing
From Communications of the ACM

Research for Practice: The Fun in Fuzzing

The debugging technique comes into its own.

OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-Program Specialization
From Communications of the ACM

OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-Program Specialization

Leveraging scalable pointer analysis, value analysis, and dynamic analysis.

OSS Supply-Chain Security: What Will It Take?
From Communications of the ACM

OSS Supply-Chain Security: What Will It Take?

A discussion with Maya Kaczorowski, Falcon Momot, George Neville-Neil, and Chris McCubbin

Mapping the Privacy Landscape for Central Bank Digital Currencies
From Communications of the ACM

Mapping the Privacy Landscape for Central Bank Digital Currencies

Now is the time to shape what future payment flows will reveal about you.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account