New: Check out the ACMQueue subreddit

New: Translations. ACM Q em Língua Portuguesa

Latest Queue Content     

Columns: The Bikeshed


Quality Software Costs Money - Heartbleed Was Free

  Poul-Henning Kamp

How to generate funding for FOSS



Security


Who Must You Trust?

  Thomas Wadlow

Security

You must have some trust if you want to get anything done.


Related:
The Answer is 42 of Course
Weapons of Mass Assignment
LinkedIn Password Leak: Salt Their Hide

Finding More Than One Worm in the Apple

  Mike Bland

If you see something, say something.


Related:
Security is Harder than You Think
Nine IM Accounts and Counting
Browser Security Case Study

The NSA and Snowden: Securing the All-Seeing Eye

  Bob Toxen

How good security at the NSA could have stopped him


Related:
More Encryption Is Not the Solution
Four Billion Little Brothers?
Communications Surveillance: Privacy and Security at Risk


Case Study

Quality Assurance


Automated QA Testing at EA:
Driven by Events

A discussion with Michael Donat, Jafar Husain,
and Terry Coatta


Related:
Orchestrating an Automated Test Lab
Finding Usability Bugs with Automated Tests
Adopting DevOps Practices in Quality Assurance

Languages


Design Exploration through Code-generating DSLs

Languages

  Bo Joel Svensson, Mary Sheeran, Ryan Newton

High-level DSLs for low-level programming


Related:
Purpose-Built Languages
The Ideal HPC Programming Language
Creating Languages in Racket


Domain-specific Languages and Code Synthesis
Using Haskell

  Andy Gill

Looking at embedded DSLs


Related:
OCaml for the Masses
The World According to LINQ
DSL for the Uninitiated


The Curse of the Excluded Middle

  Erik Meijer

"Mostly functional" programming does not work


Related:
A Conversation with Erik Meijer and José Blakeley
Multitier Programming in Hop
FPGA Programming for the Masses



Columns: Kode Vicious


Forked Over

  George V. Neville-Neil

Shortchanged by open source



Data


Data

Don't Settle for Eventual Consistency

  Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen

Stronger properties for low-latency geo-replicated storage


Related:
Proving the Correctness of Nonblocking Data Structures
Eventual Consistency Today: Limitations, Extensions, and Beyond
Structured Deferral: Synchronization via Procrastination


A Primer on Provenance

  Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, Margo Seltzer, Andy Hopper

Better understanding of data requires tracking its history and context.


Related:
Provenance in Sensor Data Management
CTO Roundtable: Storage
Better Scripts, Better Games


Provenance in Sensor Data Management

  Zachary Hensley, Jibonananda Sanyal, Joshua New

A cohesive, independent solution for bringing provenance to scientific research


Related:
Hazy: Making it Easier to Build and Maintain Big-data Analytics
The Invisible Assistant
Self-Healing Networks



Networks

Networks

Multipath TCP

  Christoph Paasch, Olivier Bonaventure

Decoupled from IP, TCP is at last able to support multihomed hosts.


Related:
Passively Measuring TCP Round-trip Times
You Don't Know Jack about Network Performance
TCP Offload to the Rescue


Rate-limiting State

  Paul Vixie

The edge of the Internet is an unruly place


Related:
DNS Complexity
Broadcast Messaging: Messaging to the Masses
Lessons from the Letter



Development


Development

Major-league SEMAT—Why Should an Executive Care?

  Ivar Jacobson, Pan-Wei Ng, Ian Spence, Paul E. McMahon

Becoming better, faster, cheaper, and happier


Related:
The Essence of Software Engineering: The SEMAT Kernel
A Conversation with Steve Bourne, Eric Allman, and Bryan Cantrill
Voyage in the Agile Memeplex

The Software Inferno

  Alex E. Bell

Dante's tale, as experienced by a software architect


Related:
Death by UML Fever
Coding for the Code
Software Development with Code Maps



Distributed Computing


Distributed%20Computing

Eventually Consistent:
Not What You Were Expecting?

  Wojciech Golab, Muntasir R. Rahman, Alvin AuYoung, Kimberly Keeton, Xiaozhou (Steve) Li

Methods of quantifying consistency (or lack thereof) in eventually consistent storage systems


Related:
Eventually Consistent
Eventual Consistency Today: Limitations, Extensions, and Beyond
BASE: An Acid Alternative


Unikernels: Rise of the Virtual Library Operating System

  Anil Madhavapeddy, David J. Scott

What if all the software layers in a virtual appliance were compiled within the same safe, high-level language framework?


Related:
Self-Healing in Modern Operating Systems
Erlang for Concurrent Programming
Passing a Language through the Eye of a Needle


Toward Software-defined SLAs

  Jason Lango

Enterprise computing in the public cloud


Related:
Why Cloud Computing Will Never Be Free
Condos and Clouds
There's Just No Getting around It: You're Building a Distributed System



Concurrency

Concurrency

Scaling Existing Lock-based Applications
with Lock Elision

  Andi Kleen

Lock elision enables existing lock-based programs to achieve the performance benefits of nonblocking synchronization and fine-grain locking with minor software engineering effort.


Related:
Proving the Correctness of Nonblocking Data Structures
Erlang for Concurrent Programming
Trials and Tribulations of Debugging Concurrency



Videos

Upcoming
ACM Learning Webinars


... more blog posts & archives 

BLOG Archives