acm-header
Sign In

Communications of the ACM

Latest Practice



Software Managers' Guide to Operational Excellence
From Communications of the ACM

Software Managers' Guide to Operational Excellence

The secret to being a great engineering leader? Setting up the right checks and balances.

Security Mismatch
From Communications of the ACM

Security Mismatch

Security must be a business enabler, not a hinderer.

Knowing What You Need to Know
From Communications of the ACM

Knowing What You Need to Know

Personal, team, and organizational effectiveness can be improved with a little preparation.

Confidential Computing: Elevating Cloud Security and Privacy
From Communications of the ACM

Confidential Computing: Elevating Cloud Security and Privacy

Working toward a more secure and innovative future.

Hardware VM Isolation in the Cloud
From Communications of the ACM

Hardware VM Isolation in the Cloud

Enabling confidential computing with AMD SEV-SNP technology.

Creating the First Confidential GPUs
From Communications of the ACM

Creating the First Confidential GPUs

The team at NVIDIA brings confidentiality and integrity to user code and data for accelerated computing.

Why Should I Trust Your Code?
From Communications of the ACM

Why Should I Trust Your Code?

Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.

Pointers in Far Memory
From Communications of the ACM

Pointers in Far Memory

Rethinking how data and computations should be organized.

How Flexible Is CXL's Memory Protection?
From Communications of the ACM

How Flexible Is CXL's Memory Protection?

Replacing a sledgehammer with a scalpel.

DevEX: What Actually Drives Productivity?
From Communications of the ACM

DevEX: What Actually Drives Productivity?

The developer-centric approach to measuring and improving productivity.

Beyond the Repository
From Communications of the ACM

Beyond the Repository

Best practices for open source ecosystems researchers.

Cargo Cult AI
From Communications of the ACM

Cargo Cult AI

Is the ability to think scientifically the defining essence of intelligence?

Opportunity Cost and Missed Chances in Optimizing Cybersecurity
From Communications of the ACM

Opportunity Cost and Missed Chances in Optimizing Cybersecurity

The loss of potential gain from other alternatives when one alternative is chosen.

To PiM or Not to PiM
From Communications of the ACM

To PiM or Not to PiM

The case for in-memory inferencing of quantized CNNs at the edge.

Research for Practice: The Fun in Fuzzing
From Communications of the ACM

Research for Practice: The Fun in Fuzzing

The debugging technique comes into its own.

OSS Supply-Chain Security: What Will It Take?
From Communications of the ACM

OSS Supply-Chain Security: What Will It Take?

A discussion with Maya Kaczorowski, Falcon Momot, George Neville-Neil, and Chris McCubbin

Mapping the Privacy Landscape for Central Bank Digital Currencies
From Communications of the ACM

Mapping the Privacy Landscape for Central Bank Digital Currencies

Now is the time to shape what future payment flows will reveal about you.

Split Your Overwhelmed Teams
From Communications of the ACM

Split Your Overwhelmed Teams

Two teams of five is not the same as one team of 10.

From Zero to 100
From Communications of the ACM

From Zero to 100

Demystifying zero trust and its implications on enterprise people, process, and technology.

The Arrival of Zero Trust
From Communications of the ACM

The Arrival of Zero Trust: What Does it Mean?

A discussion of zero-trust enterprise efforts in cybersecurity.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account