Table of contents for issues of ACM Queue: Tomorrow's Computing Today

Last update: Sat Nov 23 13:42:59 MST 2024                Valid HTML 3.2!

Volume 1, Number 1, March, 2003
Volume 1, Number 2, April, 2003
Volume 1, Number 3, May, 2003
Volume 1, Number 4, June, 2003
Volume 1, Number 5, July / August, 2003
Volume 1, Number 6, September / October, 2003
Volume 1, Number 7, October, 2003
Volume 1, Number 8, November, 2003
Volume 1, Number 9, December / January, 2003
Volume 1, Number 10, February, 2004
Volume 2, Number 1, March, 2004
Volume 2, Number 2, April, 2004
Volume 2, Number 3, May, 2004
Volume 2, Number 4, June, 2004
Volume 2, Number 5, July, 2004
Volume 2, Number 6, September, 2004
Volume 2, Number 7, October, 2004
Volume 2, Number 8, November, 2004
Volume 2, Number 9, December / January, 2004
Volume 3, Number 1, February, 2005
Volume 3, Number 2, March, 2005
Volume 3, Number 3, April, 2005
Volume 3, Number 4, May, 2005
Volume 3, Number 5, June, 2005
Volume 3, Number 6, July, 2005
Volume 3, Number 7, September, 2005
Volume 3, Number 8, October, 2005
Volume 3, Number 9, November, 2005
Volume 3, Number 10, December, 2005
Volume 4, Number 1, February, 2006
Volume 4, Number 2, March, 2006
Volume 4, Number 3, April, 2006
Volume 4, Number 4, May, 2006
Volume 4, Number 5, June, 2006
Volume 4, Number 6, July / August, 2006
Volume 4, Number 7, September, 2006
Volume 4, Number 8, October, 2006
Volume 4, Number 9, November, 2006
Volume 4, Number 10, December / January, 2006--2007
Volume 5, Number 1, February, 2007
Volume 5, Number 2, March, 2007
Volume 5, Number 3, April, 2007
Volume 5, Number 4, May / June, 2007
Volume 5, Number 5, July, 2007
Volume 5, Number 6, September, 2007
Volume 5, Number 7, November, 2007
Volume 6, Number 1, January, 2008
Volume 6, Number 2, March, 2008
Volume 6, Number 3, May / June, 2008
Volume 6, Number 4, jul # / # aug, 2008
Volume 6, Number 5, September, 2008
Volume 6, Number 6, October, 2008
Volume 6, Number 7, nov # / # dec, 2008
Volume 7, Number 1, January, 2009
Volume 7, Number 2, February, 2009
Volume 7, Number 3, April, 2009
Volume 7, Number 4, May, 2009
Volume 7, Number 2, February, 2009
Volume 7, Number 5, June, 2009
Volume 7, Number 6, July, 2009
Volume 7, Number 7, August, 2009
Volume 7, Number 8, September, 2009
Volume 7, Number 9, October, 2009
Volume 7, Number 10, November, 2009
Volume 7, Number 11, December, 2009
Volume 8, Number 1, January, 2010
Volume 8, Number 2, February, 2010
Volume 8, Number 3, March, 2010
Volume 8, Number 4, April, 2010
Volume 8, Number 5, May, 2010
Volume 8, Number 6, June, 2010
Volume 8, Number 7, July, 2010
Volume 8, Number 8, August, 2010
Volume 8, Number 9, September, 2010
Volume 8, Number 10, October, 2010
Volume 8, Number 11, November, 2010
Volume 8, Number 12, December, 2010
Volume 9, Number 1, January, 2011
Volume 9, Number 2, February, 2011
Volume 9, Number 3, March, 2011
Volume 9, Number 4, April, 2011
Volume 9, Number 5, May, 2011
Volume 9, Number 6, June, 2011
Volume 9, Number 7, July, 2011
Volume 9, Number 8, August, 2011
Volume 9, Number 9, September, 2011
Volume 9, Number 10, October, 2011
Volume 9, Number 11, November, 2011
Volume 9, Number 12, December, 2011
Volume 10, Number 1, January, 2012
Volume 10, Number 2, February, 2012
Volume 10, Number 3, March, 2012
Volume 10, Number 4, April, 2012
Volume 10, Number 5, May, 2012
Volume 10, Number 6, June, 2012
Volume 10, Number 7, July, 2012
Volume 10, Number 8, August, 2012
Volume 10, Number 9, September, 2012
Volume 10, Number 10, October, 2012
Volume 10, Number 11, November, 2012
Volume 10, Number 12, December, 2012
Volume 11, Number 1, January, 2013
Volume 11, Number 2, February, 2013
Volume 11, Number 3, March, 2013
Volume 11, Number 4, April, 2013
Volume 11, Number 5, May, 2013
Volume 11, Number 6, June, 2013
Volume 11, Number 7, July, 2013
Volume 11, Number 8, August, 2013
Volume 11, Number 9, September, 2013
Volume 11, Number 10, October, 2013
Volume 11, Number 11, November, 2013
Volume 11, Number 12, December, 2013
Volume 12, Number 1, January, 2014
Volume 12, Number 2, February, 2014
Volume 12, Number 3, March, 2014
Volume 12, Number 4, April, 2014
Volume 12, Number 5, May, 2014
Volume 12, Number 6, June, 2014
Volume 12, Number 7, July, 2014
Volume 12, Number 8, August, 2014
Volume 12, Number 9, September, 2014
Volume 12, Number 10, October, 2014
Volume 12, Number 11, November, 2014
Volume 13, Number 1, December / January, 2014--2015
Volume 13, Number 2, February, 2015
Volume 13, Number 3, March, 2015
Volume 13, Number 4, April, 2015
Volume 13, Number 5, May, 2015
Volume 13, Number 6, June, 2015
Volume 13, Number 7, July, 2015
Volume 13, Number 8, September / October, 2015
Volume 13, Number 9, November / December, 2015
Volume 14, Number 1, January, 2016
Volume 14, Number 2, March, 2016
Volume 14, Number 3, May, 2016
Volume 14, Number 4, July, 2016
Volume 14, Number 5, September, 2016
Volume 14, Number 6, November, 2016
Volume 15, Number 1, January, 2017
Volume 15, Number 2, March, 2017
Volume 15, Number 3, May, 2017
Volume 15, Number 4, July, 2017
Volume 15, Number 5, September / October, 2017
Volume 15, Number 6, November, 2017
Volume 16, Number 1, January, 2018
Volume 16, Number 2, March, 2018
Volume 16, Number 3, May, 2018
Volume 16, Number 4, July, 2018
Volume 16, Number 5, September, 2018
Volume 16, Number 6, November, 2018
Volume 17, Number 1, January, 2019
Volume 17, Number 2, March, 2019
Volume 17, Number 3, May, 2019
Volume 17, Number 4, July, 2019
Volume 17, Number 5, September, 2019
Volume 17, Number 6, November / December, 2019
Volume 18, Number 1, January, 2020
Volume 18, Number 2, March, 2020
Volume 18, Number 3, June, 2020
Volume 18, Number 4, August, 2020
Volume 18, Number 5, October, 2020
Volume 18, Number 6, December, 2020
Volume 19, Number 1, February, 2021
Volume 19, Number 2, April, 2021
Volume 19, Number 3, June, 2021
Volume 19, Number 4, July, 2021
Volume 19, Number 5, September, 2021
Volume 19, Number 6, November, 2021
Volume 20, Number 1, January, 2022
Volume 20, Number 2, March, 2022
Volume 20, Number 3, May, 2022
Volume 20, Number 4, July, 2022
Volume 20, Number 5, September, 2022
Volume 20, Number 6, 2022
Volume 21, Number 1, January, 2023
Volume 21, Number 2, March, 2023
Volume 21, Number 3, May, 2023
Volume 21, Number 4, July, 2023
Volume 21, Number 5, September, 2023
Volume 21, Number 6, November, 2023
Volume 22, Number 1, January, 2024
Volume 22, Number 2, 2024
Volume 22, Number 3, May / June, 2024
Volume 22, Number 4, July, 2024
Volume 1, Number ??, 2003


ACM Queue: Tomorrow's Computing Today
Volume 1, Number 1, March, 2003

                   Steve Bourne   From the Editors: Finding the Right
                                  Questions  . . . . . . . . . . . . . . . 4--4
                   Avi Freedman   Opinion: Securing the Edge . . . . . . . 6, 8--9
         Marshall Kirk McKusick   Interview with Adam Bosworth . . . . . . 12, 14--21
            Christopher Vincent   Toolkit: Scripting Web Service
                                  Prototypes . . . . . . . . . . . . . . . 22, 23--27
                    Mike Burner   The Deliberate Revolution: Transforming
                                  Integration With XML Web Services  . . . 28--37
             Stans Kleijnen and   
                  Srikanth Raju   An Open Web Services Architecture  . . . 38--46
              Ali Arsanjani and   
             Brent Hailpern and   
              Joanne Martin and   
                      Peri Tarr   Web Services: Promises and Compromises   48--58

ACM Queue: Tomorrow's Computing Today
Volume 1, Number 2, April, 2003

            George Neville-Neil   From the Editors: The Truth About
                                  Embedded Systems . . . . . . . . . . . . 4--4
                     Randy Harr   Interview: a Conversation with Jim Ready 6, 8, 10--13
         George V. Neville-Neil   Programming Without a Net  . . . . . . . 16--23
              Telle Whitney and   
            George Neville-Neil   SoC: Software, Hardware, Nightmare,
                                  Bliss  . . . . . . . . . . . . . . . . . 24--31
                    Ivan Godard   Division of Labor In Embedded Systems    32--41
                Homayoun Shahri   Blurring Lines Between Hardware and
                                  Software . . . . . . . . . . . . . . . . 42--49
                     Rolf Ernst   Putting It All Together  . . . . . . . . 50--55

ACM Queue: Tomorrow's Computing Today
Volume 1, Number 3, May, 2003

                    Terry Coata   From the Editors: Would You Like Some
                                  Data with That?  . . . . . . . . . . . . 4--4
                     Jef Raskin   The Woes of IDEs . . . . . . . . . . . . 8, 10--11
                    Stu Feldman   Interview: a Conversation with Mario
                                  Mazzola  . . . . . . . . . . . . . . . . 12, 14--16
              Michael W. Ritter   The Future of WLAN . . . . . . . . . . . 18--27
             Bill McFarland and   
                   Michael Wong   The Family Dynamics of 802.11  . . . . . 28--38
                Lyn Bartram and   
             Michael Blackstock   Designing Portable Collaborative
                                  Networks . . . . . . . . . . . . . . . . 40--49
                Robert Poor and   
               Cliff Bowman and   
       Charlotte Burgess Auburn   Self-Healing Networks  . . . . . . . . . 52--59
               Robert J. Berger   Open Spectrum: a Path to Ubiquitous
                                  Connectivity . . . . . . . . . . . . . . 60--68
           Douglas B. Terry and   
    Venugopalan Ramasubramanian   Caching XML Web Services for Mobility    70--78

ACM Queue: Tomorrow's Computing Today
Volume 1, Number 4, June, 2003

                     Randy Harr   Storage --- $n$ Sides to Every Story . . 4--4
                    Josh Coates   Opinion: Big Storage: Make or Buy? . . . 6--7
                David Patterson   Interview: a Conversation with Jim Gray  8, 10--12, 14--17
                  Dave Anderson   You Don't Know Jack about Disks  . . . . 20--30
                Peter Lyman and   
                  Hal R. Varian   Sidebar: How Much Storage is Enough? . . 28--29
                    Erik Riedel   Storage Systems: Not Just a Bunch of
                                  Disks Anymore  . . . . . . . . . . . . . 32--41
             Jeffrey S. Goldner   The Emergence of iSCSI . . . . . . . . . 44--53
                  Steve Kleiman   DAFS: a New High-Performance Networked
                                  File System  . . . . . . . . . . . . . . 54--62

ACM Queue: Tomorrow's Computing Today
Volume 1, Number 5, July / August, 2003

                Eric Allman and   
         Marshall Kirk McKusick   From the Editors: Viewing Open Source
                                  with an Open Mind  . . . . . . . . . . . 6--7
                      Anonymous   News 2.0: Uncrackable passwords;
                                  WebFountain drinks down the Web;
                                  Embracing open source in India . . . . . 8--8
                    Eric Allman   Interview: a Conversation with Chris
                                  DiBona . . . . . . . . . . . . . . . . . 10, 12--19
                     Jim Barton   From Server Room to Living Room  . . . . 20--28, 31--32
                    Paul Ferris   The Age of Corporate Open Source
                                  Enlightenment  . . . . . . . . . . . . . 34--44
              Michael J. Karels   Commercializing Open Source Software . . 46--55
        John M. Weathersby, Jr.   Sidebar: a Foot in the Door: Can Open
                                  Source Find Traction in Government?  . . 52--53
                     Greg Lehey   Closed Source Fights Back: SCO vs. the
                                  World --- What Were They Thinking? . . . 56--62

ACM Queue: Tomorrow's Computing Today
Volume 1, Number 6, September / October, 2003

             David J. Brown and   
     George V. Neville-Neal and   
                   Terry Coatta   From the Editors: The Developer's Art
                                  Today: Aikido or Sumo? . . . . . . . . . 6--7
                      Anonymous   News 2.0: Outfoxing outsourcing;
                                  Australia pushes for less spam; There's
                                  a bug in my lunchbox . . . . . . . . . . 8--8
                     Jef Raskin   Opinion: User Interface Designers,
                                  Slaves of Fashion  . . . . . . . . . . . 10--11
                    David Brown   Interview: a Conversation with Wayne
                                  Rossing  . . . . . . . . . . . . . . . . 12, 14--20
                  Michael Donat   Debugging in an Asynchronous World . . . 22--30
                 Donn M. Seeley   Coding Smart: People vs. Tools . . . . . 32--40
         George V. Neville-Neal   Code Spelunking: Exploring Cavernous
                                  Code Bases . . . . . . . . . . . . . . . 42--48
             Peter Phillips and   
                George Phillips   No Source Code? No Problem!  . . . . . . 50--57
                    Terry Coata   Another Day, Another Bug . . . . . . . . 58--61
                    Eric Allman   Spam, Spam, Spam, Spam, Spam, the FTC,
                                  and Spam . . . . . . . . . . . . . . . . 62--69
                  Michael Mayor   Sidebar: I Challenge You to Respond? . . 66--67
                    R. Ballance   Book Review: \em Java Precisely, by
                                  Peter Seetoft, MIT Press, 2002, \$14.95,
                                  ISBN 0-262-69276-7}  . . . . . . . . . . 70--70
                     D. Chesley   Book Review: \em 802.11 Security, by
                                  Bruce Potter and Bob Fleck, O'Reilly,
                                  2002, \$34.95, ISBN 0-596-00290-4} . . . 70--70

ACM Queue: Tomorrow's Computing Today
Volume 1, Number 7, October, 2003

                  Mike MacFaden   From the Editors: CPUs with 2,000 MIPS
                                  per Watt, Anyone?  . . . . . . . . . . . 4--4
                Jim Coleman and   
                 R. Bob Lee and   
             Mel Ray Notage and   
                 Bill McFarland   Letters: OpenOffice in Home Office; The
                                  ``Smart Disk'' Is Already Here; 802.11
                                  in Action  . . . . . . . . . . . . . . . 5--5
                      Anonymous   News 2.0: Sugar Cubes Rock; Can a
                                  Personal Server Really Save Your Day?;
                                  Hot Chips Run Cool . . . . . . . . . . . 6--6
            Phillip A. Laplante   Opinion: Stand and Deliver: Why I Hate
                                  Stand-Up Meetings  . . . . . . . . . . . 7--9
                Alexander Wolfe   Toolkit: Microsoft's Compact Framework
                                  Targets Smart Devices  . . . . . . . . . 10--12
                   David Ditzel   Interview: a Conversation with Dan
                                  Dobberpuhl . . . . . . . . . . . . . . . 14--24
                 Shekhar Borkar   Getting Gigascale Chips: Challenges and
                                  Opportunities in Continuing Moore's Law  26--33
            Nick Tredennick and   
                Brion Shimamoto   The Inevitability of Reconfigurable
                                  Systems  . . . . . . . . . . . . . . . . 34--43
            Marc A. Viredaz and   
         Lawrence S. Brakmo and   
           William R. Hamburgen   Energy Management on Handheld Devices    44--52
                   Wu-chun Feng   Making a Case for Efficient
                                  Supercomputing . . . . . . . . . . . . . 54--64
                  Andrew Grover   Modern System Power Management . . . . . 66--72
               Caspar Boekhoudt   The Big Bang Theory of IDEs  . . . . . . 74--82
             Diomidis Spinellis   Reading, Writing, and Code . . . . . . . 84--89
                   Joan Horvath   Book Review: \em Lean Software
                                  Development: An Agile Toolkit, by Mary
                                  Poppendieck and Tom Poppendieck,
                                  Addison-Wesley, 2003, \$39.99, ISBN
                                  0-321-15078-3} . . . . . . . . . . . . . 90--91
                Fernando Berzal   Book Review: \em Design Methods for
                                  Reactive Systems, by R. J. Wieringa,
                                  Morgan Kaufmann, 2002, \$64.95, ISBN
                                  1-55860-755-2} . . . . . . . . . . . . . 90--91
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 92--92
                    Eric Allman   Curmudgeon: Wireless Networking
                                  Considered Flaky . . . . . . . . . . . . 96, 95

ACM Queue: Tomorrow's Computing Today
Volume 1, Number 8, November, 2003

               Wendy A. Kellogg   From the Editors . . . . . . . . . . . . 5--5
            Andrew Eberbach and   
                 Jef Raskin and   
                Mike Frisch and   
                 Mark Scott and   
                    Harry Rudin   Letters: Slaves of Fashion; On Heretics
                                  and Zealots; The FTC and Spam  . . . . . 6--6
                      Anonymous   News 2.0: Gates to Get ATM Free?; RFIDs
                                  Reverse Roles; Moore's Law of
                                  Cyber-Crime: Say It Isn't so; WI-FI $+$
                                  VoIP $=$ My New Phone? . . . . . . . . . 8--8
               Marshall T. Rose   Opinion: On Helicopters and Submarines   10, 12--13
                Alexander Wolfe   Toolkit: Eclipse: a Platform Becomes an
                                  Open-Source Woodstock  . . . . . . . . . 14--16
                    Eric Allman   Interview: a Conversation with Peter
                                  Ford . . . . . . . . . . . . . . . . . . 18, 20--27
               John C. Tang and   
                James Bo Begole   Beyond Instant Messaging . . . . . . . . 28--37
                    Frank Jania   Broadcast Messaging: Messaging to the
                                  Masses . . . . . . . . . . . . . . . . . 38--43
                 Joe Hildebrand   Nine IM Accounts and Counting  . . . . . 44--50
      George W. Fitzmaurice and   
                  Azam Khan and   
             William Buxton and   
          Gordon Kurtenback and   
             Ravin Balakrishnan   Sentient Data Access via a Diverse
                                  Society of Devices . . . . . . . . . . . 52--62
                Seth Hallem and   
                 David Park and   
                  Dawson Engler   Uprooting Software Defects at the Source 64--71
              William Stevenson   Book Review: \em Cocoa in a Nutshell by
                                  Michael Beam and James Duncan Davidson,
                                  O'Reilly & Associates, 2003, \$39.95,
                                  ISBN 0-596-00462-1}  . . . . . . . . . . 72--72
                 V. B. Kaujalgi   Book Review: \em The Bug by Ellen
                                  Ullman, Nan A. Talese/Doubleday, 2003,
                                  \$23.95, ISBN 0-385-50860-3} . . . . . . 72--72
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 74--74
                  Jakob Nielsen   Curmudgeon: IM, Not IP (Information
                                  Pollution) . . . . . . . . . . . . . . . 76, 75

ACM Queue: Tomorrow's Computing Today
Volume 1, Number 9, December / January, 2003

                Edward Grossman   From the Editors: New World Order  . . . 5--5
              Matt Elberson and   
           Kurth Guntheroth and   
            Rodney M. Bates and   
                 Donald E. Amby   Letters: Software Development Tools:
                                  Cautionary Tales; Coding for Readability 6--6
                      Anonymous   News 2.0: China's Tech Blast-Off; Thou
                                  Shalt Not Print; Dust Dreams . . . . . . 8--8
                     Jef Raskin   Opinion: Silicon Superstitions . . . . . 10--12
                Alexander Wolfe   Toolkit: GNU Tools, Still Relevant?  . . 14, 16--17
                 Tony Wasserman   Interview: a Conversation with Steve
                                  Hagan  . . . . . . . . . . . . . . . . . 18, 20--25
               Michael Turnlund   Distributed Development: Lessons Learned 26--31
                       Ken Coar   The Sun Never Sits on Distributed
                                  Development  . . . . . . . . . . . . . . 32--39
                Li-Te Cheng and   
    Cleidson R. B. de Souza and   
             Susanne Hupfer and   
             John Patterson and   
                    Steven Ross   Building Collaboration into IDEs . . . . 40--50
            Judith S. Olson and   
                  Gary M. Olson   Culture Surprises in Remote Software
                                  Development Teams  . . . . . . . . . . . 52--59
                    Gordon Bell   Sink or Swim: Know When It's Time to
                                  Bail . . . . . . . . . . . . . . . . . . 60--67
         James A. Whittaker and   
            Herbert H. Thompson   Black Box Debugging  . . . . . . . . . . 68--74
                      Lee Imrey   Book Review: \em The Code Book: The
                                  Science of Secrecy from Ancient Egypt to
                                  Quantum Cryptography by Simon Singh,
                                  Delacorte Press, 2000, \$15.00, ISBN
                                  0-385-49532-3} . . . . . . . . . . . . . 76--76
                Fernando Berzal   Book Review: \em Agile Software
                                  Development, Principles, Patterns, and
                                  Practices by Robert C. Martin, Prentice
                                  Hall, 2002, \$55.00, ISBN 0-13-597444-5} 76--76
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 77--77
                    Eric Allman   Curmudgeon: The Economics of Spam  . . . 80, 78--79

ACM Queue: Tomorrow's Computing Today
Volume 1, Number 10, February, 2004

                Edward Grossman   From the Editors: Fund and Games and
                                  Software Development . . . . . . . . . . 5--5
               Randy Senske and   
                  Azam Khan and   
               Taylor Cowan and   
           Phillip Laplante and   
                    The Editors   Letters: Sentient Data: The Notion of
                                  Location; Stand-Up Meetings Really Suck;
                                  Errata: The Game of Life . . . . . . . . 6--6
                      Anonymous   News 2.0: Boba Fett on the Microsoft
                                  Payroll?; Wi-Fi Goes WAPI; Photons and
                                  Molecules: a New Partnership; SETI Where
                                  Are You, Mersenne Prime? . . . . . . . . 8--8
        Phillip A. Laplante and   
                 Colin J. Neill   Opinion: The Demise of the Waterfall
                                  Model Is Imminent  . . . . . . . . . . . 10--15
                Alexander Wolfe   Toolkit: Java is Jumpin' . . . . . . . . 16--19
                   Chris DiBona   Interview: a Conversation with Will
                                  Harvey . . . . . . . . . . . . . . . . . 20--27
                  Jonathan Blow   Game Development: Harder Than You Think  28--37
                  Michi Henning   Massively Multiplayer Middleware . . . . 38--45
           Andrew M. Phelps and   
                 David M. Parks   Fun and Games: Multi-Language
                                  Development  . . . . . . . . . . . . . . 46--56
              Alexander Nareyek   AI in Computer Games . . . . . . . . . . 58--65
                     Dean Macri   The Scalability Problem  . . . . . . . . 66--73
                 Bruce Schneier   Sensible Authentication  . . . . . . . . 74--78
              John Richards and   
                Jim Christensen   People in Our Software . . . . . . . . . 80--86
                       Joy Gumz   Book Review: \em Hacking Exposed:
                                  Network Security Secrets and Solutions,
                                  4th ed., by Stuart McClure, Joel
                                  Scambray, and George Kurtz, McGraw-Hill,
                                  2003, \$49.99, ISBN 0-07-222742-7} . . . 88--88
              Martin Schweitzer   Book Review: \em Linux in a Nutshell,
                                  4th ed., by Ellen Siever, Stephen
                                  Figgins, and Aaron Weber, O'Reilly
                                  Books, 2003, \$39.95, ISBN
                                  0-596-00482-6} . . . . . . . . . . . . . 88--88
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 90--90
                    Josh Coates   Curmudgeon: When Bad People Happen to
                                  Good Games . . . . . . . . . . . . . . . 92, 91


ACM Queue: Tomorrow's Computing Today
Volume 2, Number 1, March, 2004

                Richard F. Lyon   From the Editors: DSP 4 You  . . . . . . 6--6
             Jack M. Nilles and   
                   Joe Fenn and   
                       Jim Gray   Letters: Required Reading for
                                  Telemanagers; State of the Carrier
                                  Industry . . . . . . . . . . . . . . . . 7--7
                      Anonymous   News 2.0: The Farmer and the Hacker;
                                  Milk and Algorithms Make for Strong
                                  Bones; Keep Your Distance  . . . . . . . 8--8
                Alexander Wolfe   Toolkit: Get Your Graphics On: OpenGL
                                  Advances with the Times  . . . . . . . . 10, 12--13
               Robert Broderson   Interview: a Conversation with Teresa
                                  Meng . . . . . . . . . . . . . . . . . . 14, 16--21
                Gene Frantz and   
                      Ray Simar   DSP: Of Processors and Processing  . . . 22--30
                Homayoun Shahri   Mapping Algorithms to DSP Architectures  32--41
                W. Patrick Hays   DSPs: Back to the Future . . . . . . . . 42--51
           William J. Dally and   
            Ujval J. Kapasi and   
            Brucek Khailany and   
                Jung Ho Ahn and   
                   Abhishek Das   Stream Processors: Programmability and
                                  Efficiency . . . . . . . . . . . . . . . 52--62
              Boris Murmann and   
                 Bernhard Boser   Digitally Assisted Analog Integrated
                                  Circuits . . . . . . . . . . . . . . . . 64--71
                   Alex E. Bell   Death by UML Fever . . . . . . . . . . . 72--80
                    Grady Booch   The Fever is Real  . . . . . . . . . . . 81--81
                   Laury Verner   BPM: The Promise and the Challenge . . . 82--91
               J. P. E. Hidgson   Book Review: \em Linux on the Mainframe
                                  by John Eilert, Maria Eisenhaendler,
                                  Dorothea Matthaeu, and Ingol Salm,
                                  Prentice Hall Professional Technical
                                  Reference, 2003, \$49.99, ISBN
                                  0-13-101415-3} . . . . . . . . . . . . . 92--92
                    H. I. Kilov   Book Review: \em The Simplicity Shift:
                                  Innovative Design Tactics in a Corporate
                                  World by Scott Jenson, Cambridge
                                  University Press, 2002, \$25, ISBN
                                  0-521-52749-X} . . . . . . . . . . . . . 92--92
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 94--94
              Stan Kelly-Bootle   Curmudgeon: Damnéd Digits . . . . . . . . 96, 95

ACM Queue: Tomorrow's Computing Today
Volume 2, Number 2, April, 2004

                Edward Grossman   From the Editors: Search --- An
                                  Enterprising Affair  . . . . . . . . . . 6--6
             Lynn H. Maxson and   
             Joseph M. Saur and   
                Colin Neill and   
               Phillip Laplante   Letters: Waterfall Redux . . . . . . . . 8--8
                      Anonymous   News 2.0: Office Suites, Meet NBOR;
                                  Security Comes First, Eventually; Three
                                  Strikes and You're Out; LOTR SneakerNet
                                  iPod . . . . . . . . . . . . . . . . . . 9--9
                     Jef Raskin   Opinion:The GIGO Principle and Voting
                                  Machines . . . . . . . . . . . . . . . . 10--11
                Alexander Wolfe   Toolkit: Intel Is Stealth Source of
                                  Heavy-Duty Software Tools  . . . . . . . 12, 14, 16--17
                   Steve Kirsch   Interview: a Conversation with Matt
                                  Wells  . . . . . . . . . . . . . . . . . 18, 20--24
               William A. Woods   Searching vs. Finding  . . . . . . . . . 26--35
            Rajat Mukherjee and   
                  Jianchang Mao   Enterprise Search: Tough Stuff . . . . . 36--46
                 Anna Patterson   Why Writing Your Own Search Engine Is
                                  Hard . . . . . . . . . . . . . . . . . . 48--53
             Mike Cafarella and   
                   Doug Cutting   Building Nutch: Open Source Search . . . 54--61
                   Nick Porcino   Gaming Graphics: The Road to Revolution  62--71
                 John Stone and   
                  Sarah Merrion   Instant Messaging or Instant Headache?   72--80
               Susan M. Merritt   Book Review: \em Extreme Programming
                                  Refactored: The Case Against XP by Matt
                                  Stephens and Doug Rosenberg, APress,
                                  2003, \$39.99, ISBN 1-590-59096-1} . . . 81--81
                       Joy Gumz   Book Review: \em Computer and Intrusion
                                  Forensics edited by George Mohay, Alison
                                  Anderson, Byron Collie, Olivier de Vel,
                                  and Rod McKemmish, Artech House, 2003,
                                  \$79.00, ISBN 1-580-53369-8} . . . . . . 81--81
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 82--82
                 David J. Brown   Curmudgeon: Search Hurts . . . . . . . . 84, 83

ACM Queue: Tomorrow's Computing Today
Volume 2, Number 3, May, 2004

                Eric Allman and   
         Marshall Kirk McKusick   From the Editors: Open Source Revisited  8--9
                 Mike Brady and   
               Vladimir Sanchez   Letters: Sender Pays?; Errata:
                                  [Alexander Nareyek, AI in Computer
                                  Games, ACM Queue 1(10) 58--65 (2004)]    10--10
                      Anonymous   News 2.0: Big Book to Better the World;
                                  A Cardboard Computer?; Obje---That's
                                  French for Interoperability  . . . . . . 11--11
                   Rodney Bates   Opinion: Buffer Overrun Madness  . . . . 12, 14
                  James Russell   Interview: a Conversation with Sam
                                  Leffler  . . . . . . . . . . . . . . . . 16--22
                 Jordan Hubbard   Open Source to the Core  . . . . . . . . 24--31
                   David Ascher   Is OS Right for You? (A Fictional Case
                                  Study) . . . . . . . . . . . . . . . . . 32--38
                 Jay Michaelson   There's No Such Thing as a Free
                                  (Software) Lunch . . . . . . . . . . . . 40--47
                    Bart Decrem   Desktop Linux: Where Art Thou? . . . . . 48--56
                    Andy Currid   TCP Offload to the Rescue  . . . . . . . 58--65
                     Ramana Rao   From IR to Search, and Beyond  . . . . . 66--73
                Dennis Anderson   Book Review: \em RFID Handbook:
                                  Fundamentals and Applications in
                                  Contactless Smart Cards and
                                  Identification by Klaus Finkenzeller,
                                  John Wiley & Sons, 2003, \$125, ISBN
                                  0-470-84402-7} . . . . . . . . . . . . . 74--74
                  S. V. Nagaraj   Book Review: \em Advances in
                                  Evolutionary Computing: Theory and
                                  Applications by Ashish Ghosh and
                                  Shigeyoshi Tsutsui, Springer-Verlag,
                                  2003, \$109, ISBN 3-540-43330-9} . . . . 74--74
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 76--76
                    Josh Coates   Curmudgeon: a Bigot by Any Other
                                  Name\ldots . . . . . . . . . . . . . . . 80, 78

ACM Queue: Tomorrow's Computing Today
Volume 2, Number 4, June, 2004

                Edward Grossman   From the Editors: The New Screen of
                                  Death  . . . . . . . . . . . . . . . . . 8--8
             Subir Sengupta and   
                Chris Maeda and   
            Pamela R. Mason and   
              Jayson Durham and   
           Cynthia Browning and   
                   Mike Zom and   
              Chris Vickery and   
                  Jon Ogden and   
           Stephen Vinowski and   
                Dave McComb and   
                   Peter Thomas   Letters: Crossing Time Zones; Is DSP
                                  Right for You?; Can Business Process
                                  Management Deliver?; That Kelly-Bootle!;
                                  Stricken by UML Fever; Errata [Alexander
                                  Wolfe, Toolkit: Get Your Graphics On:
                                  OpenGL Advances with the Times, ACM
                                  Queue 2(1), 10, 12--13 (2004)] . . . . . 10--10
                      Anonymous   News 2.0: Communications from a Field
                                  Near You; Light-Speed Disk Drives;
                                  Hand-Delivered Curried Spam?; Mind
                                  Control for the Masses?  . . . . . . . . 12--12
            Phillip A. Laplante   Opinion: First, Do No Harm: a
                                  Hippocratic Oath for Software
                                  Developers?  . . . . . . . . . . . . . . 14--18
                Alexander Wolfe   Toolkit: Grid Tools: Coming to a Cluster
                                  Near You . . . . . . . . . . . . . . . . 20--23
                 Stuart Feldman   Interview: a Conversation with Brewster
                                  Kahle  . . . . . . . . . . . . . . . . . 24, 26--30, 32--33
                   Jim Morrison   Blaster Revisited  . . . . . . . . . . . 34--43
                Marcus J. Ranum   Security: The root of the Problem  . . . 44--49
                     Ben Laurie   Network Forensics  . . . . . . . . . . . 50--56
        Herbert H. Thompson and   
                   Richard Ford   Perfect Storm: The Insider, Naivety, and
                                  Hostility  . . . . . . . . . . . . . . . 58--65
             Kenneth N. Lodding   The Hitchhiker's Guide to Biomorphic
                                  Software . . . . . . . . . . . . . . . . 66--75
                    Shrisha Rao   Book Review: \em Molecular Computing
                                  edited by Tanya Sienko, Andrew
                                  Adamatzky, Nicholas G. Rambidi, and
                                  Michael Conrad, MIT Press, 2003,
                                  \$45.00, ISBN 0-262-19487-2} . . . . . . 76--76
            Gregory D. Peterson   Book Review: \em Embedded Software for
                                  SoC, edited by Ahmed Amine Jerraya,
                                  Sungjoo Yoo, Norbert When, and Diederik
                                  Verkest, Kluwer Academic Publishers,
                                  2003, \$174.00, ISBN 1-4020-7528-6}  . . 76--76
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 78--78
              Stan Kelly-Bootle   Curmudgeon: From This Moment On  . . . . 80, 79

ACM Queue: Tomorrow's Computing Today
Volume 2, Number 5, July, 2004

                Edward Grossman   From the Editors: Virtually Yours  . . . 8--8
                Robert Cody and   
        Lawrence C. Paulson and   
                 Todd Greer and   
               Rodney Bates and   
                Daniel Myer and   
                Gary Hewitt and   
             Jay Michaelson and   
               John C. Nash and   
                    Josh Coates   Letters: Buffer Overrun Madness; Open
                                  Source: All Grown Up?; When is Free
                                  Really \em Free?; It's Not Cool to be a
                                  Bigot  . . . . . . . . . . . . . . . . . 10--10
                      Anonymous   News 2.0: Leave it to the Irish; The
                                  Tammy Faye Scam; Throttling Back Network
                                  Attacks  . . . . . . . . . . . . . . . . 12--12
                     Jef Raskin   Opinion: For Want of a Comma, the
                                  Meaning Was Lost . . . . . . . . . . . . 14--16
                     Alex Wolfe   Toolkit: Samba Does Windows-to-Linux
                                  Dance  . . . . . . . . . . . . . . . . . 18--21
                      Anonymous   What's on Your Hard Drive? . . . . . . . 22--22
                    Eric Allman   Interview: a Conversation with James
                                  Gosling  . . . . . . . . . . . . . . . . 24--33
               Mendel Rosenblum   The Reincarnation of Virtual Machines    34--40
          Poul-Henning Kamp and   
                  Robert Watson   Building Systems to Be Shared, Securely  42--51
                     Bob Supnik   Simulators: Virtual Machines of the Past
                                  (and Future) . . . . . . . . . . . . . . 52--58
                 John Viega and   
                   Matt Messier   Security is Harder than You Think  . . . 60--65
         Douglas C. Schmidt and   
          Aniruddha Gokhale and   
         Balachandran Natarajan   Leveraging Application Frameworks  . . . 66--75
                 Frank Pospiech   Book Review: \em Critical Testing
                                  Process: Plan, Prepare, Perform,
                                  Perfect, by Rex Black, Addison-Wesley
                                  Professional, 2003, \$49.99, ISBN
                                  0-201-74868-1} . . . . . . . . . . . . . 76--76
                    A. K. Menon   Book Review: \em Balancing Agility and
                                  Discipline: A Guide for the Perplexed,
                                  by Barry Boehm and Richard Turner,
                                  Addison-Wesley Professional, 2003,
                                  \$29.99, ISBN 0-321-18612-5} . . . . . . 76--76
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 78--78
              Stan Kelly-Bootle   Curmudgeon: Without a NULL That String
                                  Would Never End  . . . . . . . . . . . . 80, 79

ACM Queue: Tomorrow's Computing Today
Volume 2, Number 6, September, 2004

                Edward Grossman   From the Editors: Calling All Cars
                                  [overstrike] Readers . . . . . . . . . . 8--8
          Jeffrey R. Coates and   
            Vadim Kavalerov and   
                Brian Goetz and   
               Marcus Ranum and   
            Ryan McLoughlin and   
                Robert Angelino   Letters: Buffer Overruns and Everyone;
                                  Another Look at Security Problems  . . . 10--10
                      Anonymous   News 2.0: Smoke Signals, Cellphone
                                  Style; File Sharing: Crime and
                                  Punishment Unplugged; Musican
                                  Composition by Any\_Body . . . . . . . . 11--11
                   Rodney Bates   Opinion: Schizoid Classes  . . . . . . . 12--15
                Alexander Wolfe   Toolkit: Longhorn Ties Platform Apps to
                                  Core Operating System  . . . . . . . . . 16--19
                      Anonymous   What's on Your Hard Drive? . . . . . . . 20--20
                   Lucy Sanders   Interview: a Conversation with Donald
                                  Peterson . . . . . . . . . . . . . . . . 22--29
             Phil Sherburne and   
                Cary Fitzgerald   You Don't Know Jack About VoIP . . . . . 30--38
               James E. Coffman   Not Your Father's PBX? . . . . . . . . . 40--47
            Sudhir R. Ahuja and   
                   Robert Ensor   VoIP: What is it Good for? . . . . . . . 48--55
          Douglas C. Sicker and   
                 Tom Lookabaugh   VoIP Security: Not an Afterthought . . . 56--64
                    Gordon Bell   A Time and a Place for Standards . . . . 66--74
            Hector Zenil Chavez   Book Review: \em Quantum Computing
                                  (Natural Computing Series), 2nd ed., by
                                  Mika Hirvensalo, Springer-Verlag, 2004,
                                  \$54.95, ISBN 3-540-40704-9} . . . . . . 76--76
              Andre Mariën   Book Review: \em Security Warrior by
                                  Cyrus Peikari and Anton Chuvakin,
                                  O'Reilly, 2004, \$44.95, ISBN
                                  0-596-00545-8} . . . . . . . . . . . . . 76--76
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 78--78
              Stan Kelly-Bootle   Curmudgeon: Vote Early, Vote Often . . . 80--79

ACM Queue: Tomorrow's Computing Today
Volume 2, Number 7, October, 2004

                Edward Grossman   From the Editors: RFID isn't science
                                  fiction  . . . . . . . . . . . . . . . . 10--10
                Edward Grossman   Letters  . . . . . . . . . . . . . . . . 12--12
                Edward Grossman   News 2.0 . . . . . . . . . . . . . . . . 13--13
                Edward Grossman   What's on your hard drive? . . . . . . . 14--14
            George Neville-Neil   Kode Vicious . . . . . . . . . . . . . . 16--18
                 Barbara Simons   Electronic voting systems: the good, the
                                  bad, and the stupid  . . . . . . . . . . 20--26
                Alexander Wolfe   There's still some life left in Ada  . . 28--31
            George Neville-Neil   Interview: a conversation with Mike
                                  Deliman  . . . . . . . . . . . . . . . . 32--39
                       Roy Want   The magic of RFID  . . . . . . . . . . . 40--48
                   Sanjay Sarma   Integrating RFID . . . . . . . . . . . . 50--57
     Marshall Kirk McKusick and   
         George V. Neville-Neil   Thread scheduling in FreeBSD 5.2 . . . . 58--64
                 Kang Su Gatlin   Trials and tribulations of debugging
                                  concurrency  . . . . . . . . . . . . . . 66--73
                Edward Grossman   Review of \em Dynamic Reconfiguration:
                                  Architectures and Algorithms by
                                  Ramachandran Vaidyanathan and Jerry L.
                                  Trahan. Plenum Publishing, 2003, ISBN
                                  0-306-48189-8  . . . . . . . . . . . . . 74--74
                Edward Grossman   Review of \em Immunity-based systems by
                                  Yoshiteru Ishida. Springer-Verlag, 2004,
                                  ISBN 3-540-00896-9 . . . . . . . . . . . 74--74
                Edward Grossman   Calendar . . . . . . . . . . . . . . . . 76--76
               Phillip Laplante   The burning bag of dung: and other
                                  environmental antipatterns . . . . . . . 80

ACM Queue: Tomorrow's Computing Today
Volume 2, Number 8, November, 2004

                Edward Grossman   From the Editors: The guru code  . . . . 10--10
               Ulrich Grude and   
               Rodney Bates and   
            Annelise Gimpel and   
          Stan Kelly-Bootle and   
                Henri Socha and   
                 Bob Supnik and   
                   Ian Phillips   Letters: Schizoid Classes; Don't Forget
                                  to Vote!; Something about Simulators;
                                  The Bigots of the World  . . . . . . . . 12--12
                    John Stanik   News 2.0: New Web Provides
                                  Battery-powered Option; There's Nothing
                                  Like a Map; Shall I Compare Thee to a
                                  Big Squeeze?; Linux Support: a Black
                                  Hole?  . . . . . . . . . . . . . . . . . 14--14
                Edward Grossman   What's on your hard drive? . . . . . . . 16--16
            George Neville-Neil   Kode Vicious strikes again . . . . . . . 18--21
                   Steve Bourne   Interview: a conversation with Bruce
                                  Lindsay  . . . . . . . . . . . . . . . . 22--33
                 Aaron B. Brown   Oops! Coping with human error in IT
                                  systems  . . . . . . . . . . . . . . . . 34--41
                 Brendan Murphy   Automating software failure reporting    42--48
             Paul P. Maglio and   
                  Eser Kandogan   Error messages: what's the problem?  . . 50--55
                    Adam Kolawa   Outsourcing: devising a game plan  . . . 56--62
                     Vijay Gill   Lack of priority queuing considered
                                  harmful  . . . . . . . . . . . . . . . . 64--69
                Bayard Kohlhepp   Review of \em Network Distributed
                                  Computing: Fitscapes and Fallacies by
                                  Max K. Goff. Prentice Hall Professional
                                  Technical Reference, 2003, ISBN
                                  0-13-100152-3  . . . . . . . . . . . . . 70--70
                 Rita Puzmanova   Review of \em Wi-Foo: The Secrets of
                                  Wireless Hacking by Andrew Vladimirov,
                                  Konstantin V. Gravrilenko, and Andrei A.
                                  Mikhailovsky. Pearson Education, 2004,
                                  ISBN 0-321-20217-1 . . . . . . . . . . . 70--70
                Edward Grossman   Calendar . . . . . . . . . . . . . . . . 72--72
                Edward Grossman   Careers  . . . . . . . . . . . . . . . . 74--77
                   Rodney Bates   Curmudgeon: Programming in Franglais . . 80, 78

ACM Queue: Tomorrow's Computing Today
Volume 2, Number 9, December / January, 2004

                Edward Grossman   From the Editors: The big programming
                                  languages issue  . . . . . . . . . . . . 10--10
          Charles Kerpelman and   
                The Editors and   
               Martin Smith and   
                Harry Rudin and   
             Yaacov Fenster and   
               Marcus Ranum and   
               Scott Howser and   
                Alexander Wolfe   Letters: Kode Vicious Wants You;
                                  Deliman's da Man; In Want of Nothing;
                                  The \tt root of the Problem, Redux;
                                  Longhorn and WinFS . . . . . . . . . . . 12--12
                    John Stanik   News 2.0: It Isn't Going Away \ldots But
                                  IT Jobs Are; 4 GHz Goes Bust;
                                  Trojan-Spyware Deathmatch; Desktop
                                  Search Madness . . . . . . . . . . . . . 13--13
                Edward Grossman   What's on your hard drive? . . . . . . . 14--14
            George Neville-Neil   Kode Vicious the return  . . . . . . . . 16--18
                 Stuart Feldman   Interview: a conversation with Alan Kay  20--30
                 John R. Mashey   Languages, levels, libraries, and
                                  longevity  . . . . . . . . . . . . . . . 32--38
                 Roger Sessions   Fuzzy boundaries: objects, components,
                                  and Web services . . . . . . . . . . . . 40--47
              Gregory V. Wilson   Extensible programming for the 21st
                                  Century  . . . . . . . . . . . . . . . . 48--57
                    Donn Seeley   How Not to Write Fortran in Any Language 58--65
             Michael W. Shapiro   Self-healing in modern operating systems 66--75
                      M. S. Joy   Review of \em Eclipse by Steve Holzner.
                                  O'Reilly & Associates, 2004, \$44.95,
                                  ISBN 0-596-00641-1}  . . . . . . . . . . 76--76
                     T. Portele   Review of \em Spoken Dialogue Technology
                                  by Michael F. McTear. Springer-Verlag,
                                  2004, \$59.95, ISBN 1-85233-672-2} . . . 76--76
                Edward Grossman   Calendar . . . . . . . . . . . . . . . . 77--77
              Stan Kelly-Bootle   Curmudgeon: Linguae Francae  . . . . . . 80, 78--79


ACM Queue: Tomorrow's Computing Today
Volume 3, Number 1, February, 2005

                Edward Grossman   From the Editors: Puttin' the \em Queue
                                  in QA  . . . . . . . . . . . . . . . . . 8--8
                   Tim Eure and   
              Ben Kuehlhorn and   
                 Vijay Gill and   
                James Synge and   
                Edward Weir and   
                    The Editors   Letters: RFID Revisited; \em Queueing Up
                                  Priority Queueing; Guru Code Overload    10--10
                Edward Grossman   What's on your hard drive? . . . . . . . 11--11
            George Neville-Neil   Kode Vicious Unleashed . . . . . . . . . 12--13
                       Jim Gray   Interview: a conversation with Tim Bray  20--25
                 Stuart Feldman   Quality assurance: much more than
                                  testing  . . . . . . . . . . . . . . . . 26--29
                   Keith Stobie   Too darned big to test . . . . . . . . . 30--37
               William W. White   Sifting through the software sandbox:
                                  SCM meets QA . . . . . . . . . . . . . . 38--44
                  Michael Donat   Orchestrating an automated test lab  . . 46--53
         Mark Kobayashi-Hillary   A passage to India . . . . . . . . . . . 54--60
                    Arun Ektare   Review of \em Designing Software for the
                                  Mobile Context: a Practitioner's Guide
                                  (Computer Communications and Networks)
                                  by Roman Longoria (Ed.),
                                  Springer-Verlag, 2004, \$69.95, ISBN
                                  1-85233-785-0} . . . . . . . . . . . . . 61--61
                     Radu State   Review of \em Network Security
                                  Architectures by Sean Convery, Cisco
                                  Press, 2004, \$55.00, ISBN
                                  1-58705-115-X} . . . . . . . . . . . . . 61--61
                Edward Grossman   Calendar . . . . . . . . . . . . . . . . 62--62
                   Terry Coatta   Curmudgeon: Traipsing through the QA
                                  tools desert . . . . . . . . . . . . . . 64--64

ACM Queue: Tomorrow's Computing Today
Volume 3, Number 2, March, 2005

                 David J. Brown   From the editors: An update on software
                                  updates  . . . . . . . . . . . . . . . . 10--11
             Kurt Gunteroth and   
                Greg Wilson and   
            Michael Erdmann and   
            Dmitriy Vasilev and   
                   Ed Ravin and   
                      Vivek Rao   Letters: Extensible Programming,
                                  Extended Edition; A Lesson in
                                  Self-Healing; Fortran Lives  . . . . . . 12--14
                    John Stanik   News 2.0: a Patent Reduction in IP
                                  Squabbles; Widgets, Macintosh Style;
                                  Biometrics Goes $3$D . . . . . . . . . . 16--16
                Edward Grossman   What's on your hard drive? . . . . . . . 18--18
            George Neville-Neil   Kode Vicious reloaded  . . . . . . . . . 20, 22
                  Joseph Dadzie   Understanding software patching  . . . . 24--30
                George Brandman   Patching the enterprise  . . . . . . . . 32--39
                  Dorian Birsan   On plug-ins and extensible architectures 40--46
                   Alex E. Bell   UML fever: diagnosis and recovery  . . . 48--56
                   David Bellin   Review of \em PHP5 and MySQL Bible by
                                  Tim Converse and Joyce Park, Clark
                                  Morgan Wiley, 2004, \$49.99, ISBN
                                  0-7645-5746-7} . . . . . . . . . . . . . 58--58
                    R. S. Chang   Review of \em Integration-Ready
                                  Architecture and Design: Software
                                  Engineering with XML, Java, .NET,
                                  Wireless, Speech, and Knowledge
                                  Technologies by Jeff Zhuk, Cambridge
                                  University Press, 2004, \$75.00, ISBN
                                  0-521-52583-7} . . . . . . . . . . . . . 58--58
                Edward Grossman   Calendar . . . . . . . . . . . . . . . . 60--60
                     Jef Raskin   Curmudgeon: Comments are more important
                                  than code  . . . . . . . . . . . . . . . 64, 62--63

ACM Queue: Tomorrow's Computing Today
Volume 3, Number 3, April, 2005

                Edward Grossman   From the Editors: I am an abstraction
                                  layer  . . . . . . . . . . . . . . . . . 8--8
             Philip Burgess and   
         Miriam Amos Nihart and   
          Manfred Berndtgen and   
                Dan Griffin and   
               Gabe da Silveira   Letters: QA $ ! = $ Testing; More Common
                                  than You Think; Kay-OK . . . . . . . . . 10--10
                    John Stanik   News 2.0: Gridding for a Cure; Wanted:
                                  Windows Robots; Lost in Licenses . . . . 11--11
                Edward Grossman   What's on your hard drive? . . . . . . . 14--14
            George Neville-Neil   Kode Vicious battles on  . . . . . . . . 15--17
                 James Hamilton   Interview: a conversation with Pat
                                  Selinger . . . . . . . . . . . . . . . . 18--28
                   Jim Gray and   
                   Mark Compton   A call to arms . . . . . . . . . . . . . 30--38
                   James Ostell   Databases of discovery . . . . . . . . . 40--48
                  Margo Seltzer   Beyond relational databases  . . . . . . 50--58
                 A. Mariën   Review of \em Exploiting Software: How
                                  to Break Code by Greg Hoglund and Gary
                                  McGraw, Addison-Wesley, 2004, \$49.99,
                                  ISBN 0-201-78695-8}  . . . . . . . . . . 60--60
               Carlos F. Enguix   Review of \em Explorer's Guide to the
                                  Semantic Web by Thomas B. Passin,
                                  Manning Publications, 2004, \$39.95,
                                  ISBN 1-932394-20-6}  . . . . . . . . . . 61--61
                Edward Grossman   Calendar . . . . . . . . . . . . . . . . 62--62
              Stan Kelly-Bootle   Curmudgeon: File under ``unknowable!''   64, 63

ACM Queue: Tomorrow's Computing Today
Volume 3, Number 4, May, 2005

                    John Stanik   From the Editors: Mobile applications
                                  get real . . . . . . . . . . . . . . . . 8--8
          David H. Winfield and   
                  Erik Hoel and   
                The Editors and   
            Georges Brigham and   
              Stan Kelly-Bootle   Letters: Readers' Comments are
                                  Important, Too; APL $=$ A Possible
                                  Lingua Franca? . . . . . . . . . . . . . 10--10
                    John Stanik   News 2.0: Kernel Solid, But Vulnerable;
                                  IT Security Get Physical; A Warm
                                  Reception for Reject Chips . . . . . . . 14--14
                Edward Grossman   What's on your hard drive  . . . . . . . 15--15
            George Neville-Neil   Kode Vicious vs. Mothra  . . . . . . . . 16--18
                  Kirk McKusick   Interview: a conversation with Tim
                                  Marsland . . . . . . . . . . . . . . . . 20--28
                    Bruce Zenel   Enterprise-grade wireless  . . . . . . . 30--37
                    Fred Kitson   Mobile media: making it a reality  . . . 38--47
                    Tom Gerstel   Streams and standards: delivering mobile
                                  video  . . . . . . . . . . . . . . . . . 48--53
                 Kevin Fall and   
                  Steve McCanne   You don't know jack about network
                                  performance  . . . . . . . . . . . . . . 54--59
                  G. K. Jenkins   Review of \em Expert .NET Programming by
                                  Simon Robinson, Apress, 2004, \$59.99,
                                  ISBN 1-59059-222-0}  . . . . . . . . . . 60--60
                  Marlin Thomas   Review of \em Building Clustered Linux
                                  Systems by Robert W. Lucke, Prentice
                                  Hall PTR, 2004, \$49.99, ISBN
                                  0-13-144853-6} . . . . . . . . . . . . . 60--60
                Edward Grossman   Calendar . . . . . . . . . . . . . . . . 61--61
               Phillip Laplante   Curmudgeon: Mal Managerium: a Field
                                  Guide  . . . . . . . . . . . . . . . . . 64, 62--63

ACM Queue: Tomorrow's Computing Today
Volume 3, Number 5, June, 2005

                     Randy Harr   From the editors: On feeling secure in
                                  an unsafe world  . . . . . . . . . . . . 8--8
           Vladimir Sanchez and   
                Heidi Markovitz   Letters: Selinger's Inspiring Words;
                                  Plug-In Predecessors . . . . . . . . . . 12--12
                    John Stanik   News 2.0: Losing our Edge? The Real Cost
                                  of Linux; Say No to Crackberries . . . . 14--14
                     Jim Maurer   What's on your hard drive? . . . . . . . 16--16
            George Neville-Neil   Kode vicious gets dirty  . . . . . . . . 18--20
                     Jim Maurer   Interview: a conversation with Peter
                                  Tippett and Steven Hofmeyr . . . . . . . 22--32
                  Thomas Wadlow   The answer is $ 42 $ of course . . . . . 34--39
                     John Viega   Security---problem solved? . . . . . . . 40--50
                 Bruce Schneier   Attack trends: 2004 and 2005 . . . . . . 52--53
                     Ken Arnold   Programmers are people, too  . . . . . . 54--59
                      Don Chand   Review of \em Privacy: What Developers
                                  and IT Professionals Should Know by J.
                                  C. Cannon, Addison-Wesley Professional,
                                  2004, \$49.99. ISBN 0-321-22409-4} . . . 60--60
                 A. Mariën   Review of \em IPv6 Network Programming
                                  by Jun-ichiro itojun Hagino, Digital
                                  Press, 2004, \$49.95, ISBN
                                  1-55558-318-0} . . . . . . . . . . . . . 60--60
                     Jim Maurer   Calendar . . . . . . . . . . . . . . . . 61--61
                   Rodney Bates   Curmudgeon: Syntactic heroin . . . . . . 64, 62--63

ACM Queue: Tomorrow's Computing Today
Volume 3, Number 6, July, 2005

                 Stuart Feldman   From the editors: Distributed computing
                                  in the modern enterprise . . . . . . . . 8--8
                    John Stanik   News 2.0: ``Ransom-ware'' on the loose;
                                  Adopt IPv6 or die; IBM Steps up on Linux
                                  training . . . . . . . . . . . . . . . . 10--10
                     Jim Maurer   What's on your hard drive? . . . . . . . 12--12
            George Neville-Neil   Kode Vicious: Kode Vicious Cycles On . . 14--16
                     Jim Maurer   Interview: a conversation with David
                                  Anderson . . . . . . . . . . . . . . . . 18--25
                 Ian Foster and   
                  Steven Tuecke   Describing the elephant: the different
                                  faces of IT as service . . . . . . . . . 26--29
                    Dean Jacobs   Enterprise software as service . . . . . 36--42
                   Pankaj Kumar   Web services and IT management . . . . . 44--49
                    Paul Strong   Enterprise Grid computing  . . . . . . . 50--59
                    Sajjad Khan   Review of ``Struts Recipes by George
                                  Franciscus and Danilo Gurovich'',
                                  Manning Publications, 2004, \$44.95 ISBN
                                  1-932394-24-9} . . . . . . . . . . . . . 60--60
                     Radu State   Review of ``Gray Hat Hacking: The
                                  Ethical Hacker's Handbook by Shon
                                  Harris, Allen Harper, Chris Eagle,
                                  Jonathan Ness, and Michael Lester'',
                                  McGraw-Hill Osborne Media, 2004, \$49.99
                                  ISBN 0-07-225709-1}  . . . . . . . . . . 60--60
                     Jim Maurer   Calendar . . . . . . . . . . . . . . . . 61--61
           Stanley Kelly-Bootle   Curmudgeon: Call that gibberish  . . . . 64, 62--63

ACM Queue: Tomorrow's Computing Today
Volume 3, Number 7, September, 2005

                     Jim Maurer   News 2.0: Open Source/2; Anti-spam
                                  activism \ldots or vigilantism?; Ride,
                                  robot, ride  . . . . . . . . . . . . . . 8--8
                     Jim Maurer   What's on your hard drive? . . . . . . . 10--10
            George Neville-Neil   Kode Vicious: KV the Konqueror . . . . . 12--14
                     Jim Maurer   Interview: a conversation with Roger
                                  Sessions and Terry Coatta  . . . . . . . 16--25
             Kunle Olukotun and   
                  Lance Hammond   The future of microprocessors  . . . . . 26--29
              Richard McDougall   Extreme software scaling . . . . . . . . 36--46
      Luiz André Barroso   The price of performance . . . . . . . . 48--53
                Herb Sutter and   
                    James Larus   Software and the concurrency revolution  54--62
                  Mache Creeger   Curmudgeon: Multicore CPUs for the
                                  masses . . . . . . . . . . . . . . . . . 64, 63

ACM Queue: Tomorrow's Computing Today
Volume 3, Number 8, October, 2005

              Charlene O'Hanlon   From the Editors: Unstructured, but not
                                  really . . . . . . . . . . . . . . . . . 8--8
                    John Stanik   News 2.0: OSx86 for the Masses?; OS? We
                                  Don't Need No Stinkin' OS; Real Crime
                                  Descends upon Virtual World  . . . . . . 10--10
              Charlene O'Hanlon   What's on your hard drive? . . . . . . . 12--12
            George Neville-Neil   Kode Vicious: Kode Vicious unscripted    14--16
               Daniela Florescu   Managing semi-structured data  . . . . . 18--24
                  Adam Bosworth   Learning from the Web  . . . . . . . . . 26--32
         C. M. Sperberg-McQueen   XML $<$ and semi-structured data$>$  . . . 34--41
                    Natalya Noy   Order from chaos . . . . . . . . . . . . 42--49
                    Alon Halevy   Why your data won't mix  . . . . . . . . 50--58
                  J. S. Edwards   Review of ``Slamming Spam: A Guide for
                                  System Administrators'' by Robert
                                  Haskins and Dale Nielsen, Addison-Wesley
                                  Professional, 2004, \$44.99 ISBN
                                  0-13-146716-6} . . . . . . . . . . . . . 60--60
                      Neil Karl   Review of ``Official Eclipse 3.0 FAQs''
                                  by John Arthorne and Chris Laffra,
                                  Addison-Wesley Professional, 2004,
                                  \$34.99 ISBN 0-321-26838-5}  . . . . . . 60--60
              Charlene O'Hanlon   Calendar . . . . . . . . . . . . . . . . 61--61
                    Chris Suver   Curmudgeon: The cost of data . . . . . . 64, 62--63

ACM Queue: Tomorrow's Computing Today
Volume 3, Number 9, November, 2005

              Charlene O'Hanlon   From the editors: Socially acceptable
                                  behavior . . . . . . . . . . . . . . . . 8--8
                    John Stanik   News 2.0: Acoustical Spying Techniques
                                  Cooked up in the Lab; .ODF Delivers
                                  Crushing Blow to .DOC;
                                  Wikibooks---Coming to a Classroom Near
                                  You? . . . . . . . . . . . . . . . . . . 10--10
              Charlene O'Hanlon   What's on your hard drive? . . . . . . . 12--12
            George Neville-Neil   Kode Vicious: The Doctor is In . . . . . 14--16
              Charlene O'Hanlon   Interview: a conversation with Ray Ozzie 18--26
               David Millen and   
          Jonathan Feinberg and   
                   Bernard Kerr   Social bookmarking in the enterprise . . 28--35
          Vipul Ved Prakash and   
                 Adam O'Donnell   Fighting spam with reputation systems    36--41
             Andreas Gustafsson   Threads without the pain . . . . . . . . 42--47
                Andrew McCallum   Information extraction: distilling
                                  structured data from unstructured text   48--57
                Fernando Berzal   Review of ``Working Effectively with
                                  Legacy Code'', by Michael Feathers,
                                  Prentice Hall PTR, 2004, \$44.99 ISBN
                                  0-13-117705-2} . . . . . . . . . . . . . 58--58
                  G. K. Jenkins   Review of ``The Linux Enterprise
                                  Cluster'', by Karl Kopper, No Starch
                                  Press, 2005, \$49.95 ISBN 1-59327-036-4} 58--58
              Charlene O'Hanlon   Calendar . . . . . . . . . . . . . . . . 60--60
                David Patterson   Curmudgeon: Stop whining about
                                  outsourcing! . . . . . . . . . . . . . . 64, 63

ACM Queue: Tomorrow's Computing Today
Volume 3, Number 10, December, 2005

              Charlene O'Hanlon   From the editors: In with the new  . . . 8--8
                    John Stanik   News 2.0: Web 2.0---Looking Toward the
                                  Future or Reviving the Past?; Easy Come,
                                  Easy Splog; Carpal Tunnel Is So
                                  Nineties!  . . . . . . . . . . . . . . . 10--10
              Charlene O'Hanlon   What's on your hard drive? . . . . . . . 11--11
            George Neville-Neil   Kode Vicious: Vicious XSS  . . . . . . . 12--15
              Charlene O'Hanlon   Interview: a conversation with Phil
                                  Smoot  . . . . . . . . . . . . . . . . . 16--24
                  Daniel Rogers   Lessons from the floor . . . . . . . . . 26--32
                   Bill Hoffman   Monitoring, at your service  . . . . . . 34--43
         Friedrich Steimann and   
              Thomas Kühne   Coding for the code  . . . . . . . . . . 44--51
                    A. K. Menon   Review of ``Open Systems and Standards
                                  for Software Product Development'' by P.
                                  A. Dargan, Artech House, 2005, \$89.00,
                                  ISBN 1-58053-749-9}  . . . . . . . . . . 52--52
                  Andreas Tomek   Review of ``Intrusion Prevention and
                                  Active Response: Deploying Network and
                                  Host IPS'' by Michael Rash, Angela D.
                                  Orebaugh, Graham Clark, Becky Pinkard,
                                  and Jake Babbin, Syngress Publishing,
                                  2005, \$49.99, ISBN 1-932266-47-X} . . . 52--52
              Stan Kelly-Bootle   Curmudgeon: Anything Su Doku, I can do
                                  better . . . . . . . . . . . . . . . . . 56, 54


ACM Queue: Tomorrow's Computing Today
Volume 4, Number 1, February, 2006

              Charlene O'Hanlon   From the editors: Quality really is job
                                  #1 . . . . . . . . . . . . . . . . . . . 8--8
                    John Stanik   News 2.0: IPv6 Gains Government
                                  Traction; Search-as-a-Service Gets
                                  Serious; When Detecting Life, Is
                                  Biometrics All Thumbs? . . . . . . . . . 10--10
              Charlene O'Hanlon   What's on your hard drive? . . . . . . . 11--11
            George Neville-Neil   Kode Vicious: Gettin' your kode on . . . 12--14
              Charlene O'Hanlon   Interview: a conversation with Jarod
                                  Jenson . . . . . . . . . . . . . . . . . 16--24
                 Bryan Cantrill   Hidden in plain sight  . . . . . . . . . 26--36
                 Philip Beevers   A high-performance team  . . . . . . . . 38--43
                 Bart Smaalders   Performance anti-patterns  . . . . . . . 44--50
                     Mark Purdy   Modern Performance Monitoring  . . . . . 48--57
               Arthur Gittleman   Review of ``Foundations of Ajax'' by
                                  Ryan Asleson and Nathaniel Schutta,
                                  APress, 2005, \$39.99, ISBN
                                  1-59059-582-3} . . . . . . . . . . . . . 62--62
                     Radu State   Review of ``Switching to VoIP'' by Ted
                                  Wallingford, O'Reilly & Associates, 2005,
                                  \$39.95, ISBN 0-596-00868-6} . . . . . . 62--62
               Phillip Laplante   Curmudgeon: It isn't your father's
                                  realtime anymore . . . . . . . . . . . . 64, 63

ACM Queue: Tomorrow's Computing Today
Volume 4, Number 2, March, 2006

            Nicholas Roeder and   
                Martin Wheatman   Letters: Questioning MDD; The Economics
                                  of Outsourcing . . . . . . . . . . . . . 7--7
                    John Stanik   News 2.0: Symantec's Semantics; Spyware
                                  Defined---For Now; More over Spyware,
                                  There's Myware . . . . . . . . . . . . . 8--8
              Charlene O'Hanlon   Reader files: What's on your hard drive? 9--9
            George Neville-Neil   Kode Vicious: Human-KV interaction . . . 10--12
              Charlene O'Hanlon   Interview: a conversation with Steve
                                  Ross-Talbot  . . . . . . . . . . . . . . 14--23
                  Peter De Jong   Q focus: Workflow systems: Going with
                                  the flow . . . . . . . . . . . . . . . . 24--32
                   James Champy   People and process . . . . . . . . . . . 34--38
                    Derek Miers   Best practice (BPM)  . . . . . . . . . . 40--48
           Duncan Johnston-Watt   Under new management . . . . . . . . . . 50--58
                   Elliot Jaffe   Review of ``Pro Perl'' by Peter
                                  Wainwright, Apress, 2005, \$59.99, ISBN
                                  1-59059-438-X} . . . . . . . . . . . . . 59--59
                  Marc Paquette   Review of ``Wiki: Web Collaboration'' by
                                  Anja Ebersbach, Markus Glaser and
                                  Richard Heigl, Springer, 2005, \$64.95,
                                  ISBN 3-540-25995-3}  . . . . . . . . . . 59--59
              Charlene O'Hanlon   Calendar . . . . . . . . . . . . . . . . 60--61
              Stan Kelly-Bootle   Curmudgeon: But, having said that,
                                  \ldots . . . . . . . . . . . . . . . . . 64, 63

ACM Queue: Tomorrow's Computing Today
Volume 4, Number 3, April, 2006

              Charlene O'Hanlon   From the Editors: The private universe   7--7
                    John Stanik   News 2.0: Attackers Set Sights on Macs;
                                  Sneakernet Security; IT' Paradox . . . . 8--8
              Charlene O'Hanlon   What's on your hard drive? . . . . . . . 9--9
            George Neville-Neil   Kode Vicious: Kode Vicious bugs out  . . 10--12
              Charlene O'Hanlon   Interview: a conversation with Chuck
                                  McManis  . . . . . . . . . . . . . . . . 13--21
                   Terry Coatta   Q Focus: Purpose-Built Systems: The (not
                                  so) hidden computer  . . . . . . . . . . 22--26
                     Jim Barton   TiVo-lution  . . . . . . . . . . . . . . 28--35
                Stephen Johnson   Java in a teacup . . . . . . . . . . . . 36--41
           Andrea Paramithiotti   Review of ``Grid Database Design'' by
                                  April Wells, Auerbach Publications,
                                  2005, \$79.95, ISBN 0-8493-2800-4} . . . 42--42
                     Radu State   Review of ``Extrusion Detection:
                                  Security Monitoring for Internal
                                  Intrusions'' by Richard Bejtlich,
                                  Adddison-Wesley Professional, 2005,
                                  \$49.99, ISBN 0-321-34996-2} . . . . . . 42--42
                  Mache Creeger   Curmudgeon: Evolution or revolution? . . 56--ff

ACM Queue: Tomorrow's Computing Today
Volume 4, Number 4, May, 2006

              Charlene O'Hanlon   From the editors: The domino effect  . . 8--8
                    John Stanik   News 2.0: Programmers at Play; Hunch
                                  Engine Hones In; The Real Risks of RFID  9--9
              Charlene O'Hanlon   What's on your hard drive? . . . . . . . 10--11
            George Neville-Neil   Kode Vicious: Phishing for solutions . . 12--13
              Charlene O'Hanlon   Interview: a conversation with Werner
                                  Vogels . . . . . . . . . . . . . . . . . 14--22
                  Jeff Barr and   
            Luis Felipe Cabrera   AI gets a brain  . . . . . . . . . . . . 24--29
               Ryan Barrows and   
                   Jim Traverso   Search considered integral . . . . . . . 30--36
                Taf Anthias and   
                 Krishna Sankar   The network's new role . . . . . . . . . 38--46
                  Andreas Tomek   Review of ``Protect your Windows
                                  Network: From Perimeter to Data by
                                  Jesper Johansson and Steve Riely,''
                                  Addison-Wesley Professional, 2005,
                                  \$49.99, ISBN 0-321-33643-7} . . . . . . 42--42
                    Bernard Kuc   Review of ``Open Source Wireless Java
                                  Tools Suite by Robert Virkus,'' Apress,
                                  2005, \$39.99, ISBN 1-59059-503-3} . . . 48--48
                  George Hacken   Review of ``High-Assurance Design:
                                  Architecting Secure and Reliable
                                  Enterprise Applications by Clifford
                                  Berg,'' Addison-Wesley Professional,
                                  2005, \$54.99, ISBN 0-321-37577-7} . . . 50--50
                    Jose Lloret   Review of ``Securing Storage: A
                                  Practical Guide to SAN and NAS Security
                                  by Himanshu Dwivedi,'' Addison-Wesley
                                  Professional, 2005, \$49.99, ISBN
                                  0-321-34995-4} . . . . . . . . . . . . . 50--50
              Charlene O'Hanlon   Calendar . . . . . . . . . . . . . . . . 52--53
              Stan Kelly-Bootle   Curmudgeon: The calculus formally known
                                  as pi  . . . . . . . . . . . . . . . . . 56, 54--55

ACM Queue: Tomorrow's Computing Today
Volume 4, Number 5, June, 2006

              Charlene O'Hanlon   From the editors: Accessorizing  . . . . 6--6
                    John Stanik   News 2.0: Measuring the Web's Mood;
                                  Software Slump on the Mend? Mobile
                                  Gaming for Hackers . . . . . . . . . . . 7--7
              Charlene O'Hanlon   What's on your hard drive? . . . . . . . 8--8
            George Neville-Neil   Kode Vicious: Logging on with KV . . . . 9--10
              Charlene O'Hanlon   Interview: a conversation with Leo Chang
                                  of ClickShift  . . . . . . . . . . . . . 12--18
                     Greg Olsen   From COM to Common . . . . . . . . . . . 20--26
                  Michi Henning   The rise and fall of CORBA . . . . . . . 28--34
               Chris Richardson   Untangling Enterprise Java . . . . . . . 36--44
                   Len Takeuchi   ASPs: the integration challenge  . . . . 46--52
                 Michael Laszlo   Review of ``Component-Oriented
                                  Programming by Andy Ju An Wang and Kai
                                  Qian,'' Wiley-Interscience, 2005,
                                  \$89.95, ISBN 0-471-64446-3} . . . . . . 59--59
                      A. Moreno   Review of ``Agile Estimating and
                                  Planning by Mike Cohn,'' Prentice Hall
                                  PTR, 2005, \$44.99, ISBN 0-13-147941-5}  59--59
              Charlene O'Hanlon   Calendar . . . . . . . . . . . . . . . . 60--61
                   Alex E. Bell   Curmudgeon: Software development amidst
                                  the whiz of silver bullets\ldots . . . . 64, 62--63

ACM Queue: Tomorrow's Computing Today
Volume 4, Number 6, July / August, 2006

              Charlene O'Hanlon   From the editors: Able bodies  . . . . . 8--8
                    John Stanik   News 2.0: Carrying the Torch of
                                  Anti-Spam Vigilantism; Taking
                                  Constrained Programming to the Next
                                  Level; The Human Intelligence Revolution 9--9
              Charlene O'Hanlon   What's on your hard drive? . . . . . . . 10--10
            George Neville-Neil   Kode Vicious: Pointless PKI  . . . . . . 11--12
              Charlene O'Hanlon   Interview: a conversation with Jordan
                                  Cohen  . . . . . . . . . . . . . . . . . 14--23
                     John Canny   The future of human-computer interaction 24--32
               James L. Crowley   Social perception  . . . . . . . . . . . 34--43
              Gaetano Borriello   The invisible assistant  . . . . . . . . 44--49
            Jim Christensen and   
             Jeremy Sussman and   
               Stephen Levy and   
         William E. Bennett and   
        Tracee Vetting Wolf and   
               Wendy A. Kellogg   Too much information . . . . . . . . . . 50--57
                Bayard Kohlhepp   Review of ``Windows and Linux
                                  Integration: Hands-on Solutions for a
                                  Mixed Environment by Jermy Moskowitz and
                                  Thomas Boutell,'' Sybex Inc., 2005,
                                  \$59.99, ISBN 0-7821-4428-4} . . . . . . 58--58
              Melissa C. Stange   Review of ``Pro .NET 1.1 Remoting,
                                  Reflection, and Threading by David
                                  Curran, Fabio Ferracchiati, Syed Gilani,
                                  et al.,'' Apress, 2005, \$59.99, ISBN
                                  1-59059-452-5} . . . . . . . . . . . . . 58--58
              Charlene O'Hanlon   Calendar . . . . . . . . . . . . . . . . 59--59
              Stan Kelly-Bootle   Curmudgeon: Like a podcast in the sea:
                                  mean ol' LoTech blues  . . . . . . . . . 64, 62--63

ACM Queue: Tomorrow's Computing Today
Volume 4, Number 7, September, 2006

              Charlene O'Hanlon   From the editors: Playing by the rules   8--8
              Charlene O'Hanlon   What's on your hard drive? . . . . . . . 10--10
                    John Stanik   News 2.0: Open Source Gets Mac Attack;
                                  Oh No, Not Another Consortium!; Get That
                                  Chip out of My Drink . . . . . . . . . . 10--10
            George Neville-Neil   Kode vicious: Facing the strain  . . . . 12--13
                  Mache Creeger   \tt geek@home: Rationalizing a home
                                  terabyte server  . . . . . . . . . . . . 14--17
                    Eric Allman   Complying with compliance  . . . . . . . 18--21
      George W. Beeler, Jr. and   
                   Dana Gardner   A requirements primer  . . . . . . . . . 22--26
                   John Bostick   Box their SOXes off  . . . . . . . . . . 28--29
               J. C. Cannon and   
                  Marilee Byers   Compliance deconstructed . . . . . . . . 30--37
                    Tracy Ragan   Keeping score in the IT compliance game  38--43
               Vladan Jovanovic   Review of \em Refactoring Databases:
                                  Evolutionary Database Design by Scott
                                  Ambler and Pramodkumar Sadalage,
                                  Addison-Wesley Professional, 2006,
                                  \$49.99, ISBN 0-321-29353-3} . . . . . . 44--44
                     Radu State   Review of \em Software Security:
                                  Building Security In by Gary McGraw,
                                  Addison-Wesley Professional, 2006,
                                  \$49.99, ISBN 0-321-35670-5} . . . . . . 44--44
                 Greg A. Nolann   Curmudgeon: Seeking compliance nirvana   72

ACM Queue: Tomorrow's Computing Today
Volume 4, Number 8, October, 2006

              Charlene O'Hanlon   From the editors: Reality vs. perception 7--7
                    John Stanik   News 2.0: The Mobile Linux Challenge;
                                  Google not into Googling; Keeping Online
                                  Video Legit  . . . . . . . . . . . . . . 8--8
              Charlene O'Hanlon   Reader files: What's on your hard drive? 9--9
            George Neville-Neil   Kode vicious: Saddle up, aspiring code
                                  jockeys  . . . . . . . . . . . . . . . . 10--11
              Charlene O'Hanlon   Interview: a conversation with David
                                  Brown  . . . . . . . . . . . . . . . . . 14--23
                 John R. Mashey   The long road to 64 bits . . . . . . . . 24--35
                      Dan Rubel   The heart of eclipse . . . . . . . . . . 36--44
                    Damon Poole   Breaking the major release habit . . . . 46--51
              Charlene O'Hanlon   Calendar . . . . . . . . . . . . . . . . 52--52
              Stan Kelly-Bootle   Curmudgeon: You can look it up: or maybe
                                  not  . . . . . . . . . . . . . . . . . . 56, 54--55

ACM Queue: Tomorrow's Computing Today
Volume 4, Number 9, November, 2006

              Charlene O'Hanlon   From the editors: The criminal mind  . . 7--7
                    John Stanik   News 2.0: Medical Profession Slow to
                                  Embrace 'Net\ldots or Is It?;
                                  Accessibility Features Not Just for the
                                  Disabled; Emerging Markets Embrace
                                  64-bit . . . . . . . . . . . . . . . . . 8--8
              Charlene O'Hanlon   Reader files: What's on your hard drive? 9--9
            George Neville-Neil   Kode vicious: Understanding the problem  10--12
                  Mache Creeger   geek@home: Better health care through
                                  technology . . . . . . . . . . . . . . . 13--15
              Charlene O'Hanlon   Interview: a conversation with Douglas
                                  W. Jones and Peter G. Neumann  . . . . . 16--23
                     Team Cymru   Cybercrime: an epidemic  . . . . . . . . 24--35
                    Eric Allman   E-mail authentication: what, why, how?   30--34
              Thomas Wadlow and   
                   Vlad Gorelik   Criminal code: the making of a
                                  cybercriminal  . . . . . . . . . . . . . 36--41
                 Daniel E. Geer   Playing for keeps  . . . . . . . . . . . 42--48
                     Radu State   Review of ``Phishing Exposed'' by Lance
                                  James and Joe Stewart, Syngress
                                  Publishing, 2005, \$49.95, ISBN
                                  1-59749-030-X} . . . . . . . . . . . . . 50--50
                    Markus Wolf   Review of ``Spring in Action'' by Craig
                                  Walls and Ryan Breidenbach, Manning
                                  Publications, 2005, \$44.95, ISBN
                                  1-932394-35-4} . . . . . . . . . . . . . 50--50
              Charlene O'Hanlon   Calendar . . . . . . . . . . . . . . . . 52--52
            Phillip A. Laplante   Curmudgeon: The joy of spam  . . . . . . 56, 54--55

ACM Queue: Tomorrow's Computing Today
Volume 4, Number 10, December / January, 2006--2007

              Charlene O'Hanlon   From the Editors: Forward thinking . . . 8--8
                    John Stanik   News 2.0: Fox and the Weasel; Down on
                                  the Wireless Farm; Second-Life Commerce
                                  Meets First-Life IRS . . . . . . . . . . 10--10
              Charlene O'Hanlon   What's on your hard drive? . . . . . . . 11--11
            George Neville-Neil   Kode Vicious: Peerless P2P . . . . . . . 12--13
              Charlene O'Hanlon   Interview: a conversation with John
                                  Hennessy and David Patterson . . . . . . 14--22
     Ali-Reza Adl-Tabatabai and   
         Christos Kozyrakis and   
                    Bratin Saha   Unlocking concurrency  . . . . . . . . . 24--33
               Simon Crosby and   
                    David Brown   The virtualization reality . . . . . . . 34--41
                Brian Carpenter   Better, faster, more secure  . . . . . . 42--48
                   D. Spinellis   Review of `Sustainable Software
                                  Development: An Agile Perspective' by
                                  Kevin Tate, Addison-Wesley Professional,
                                  2005, \$39.99, ISBN 0-321-28608-1} . . . 49--49
                     Radu State   Review of `Hacking Exposed: Web
                                  Applications', 2nd edition by Joel
                                  Scambray, Mike Shema, and Caleb Sima,
                                  McGraw-Hill Osborne Media, 2006,
                                  \$49.99, ISBN 0-07-226299-0} . . . . . . 49--49
              Charlene O'Hanlon   Calendar . . . . . . . . . . . . . . . . 50--50
              Stan Kelly-Bootle   Curmudgeon: Will the real bots stand up? 56, 52--55


ACM Queue: Tomorrow's Computing Today
Volume 5, Number 1, February, 2007

                    John Stanik   News 2.0: Malware --- Quantity over
                                  Quality; The Home Robotics Revolution;
                                  Roboexotica  . . . . . . . . . . . . . . 8--8
                    John Stanik   What's on your hard drive? . . . . . . . 10--10
            George Neville-Neil   Kode vicious: a license to kode  . . . . 12--14
                    John Stanik   Interview: a conversation with Jamie
                                  Butler . . . . . . . . . . . . . . . . . 16--23
                   Vlad Gorelik   One step ahead . . . . . . . . . . . . . 24--31
                   Richard Ford   Open vs. closed: which source is more
                                  secure?  . . . . . . . . . . . . . . . . 32--38
                 David F. Bacon   Realtime garbage collection  . . . . . . 40--49
                Fernando Berzal   Review of `Why Programs Fail: a Guide to
                                  Systematic Debugging' by Andreas Zeller,
                                  Morgan Kaufmann, 2005, \$54.95, ISBN
                                  1-55860-866-4} . . . . . . . . . . . . . 50--50
                 Jeffrey Putnam   Review of `Model Driven Architecture and
                                  Ontology Development' by Dragan
                                  Ga\vsevi\'c, Dragan Djuri\'c, and Vladan
                                  Devedzic, Springer, 2006, \$59.99, ISBN
                                  3-540-32180-2} . . . . . . . . . . . . . 50--50
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 52--52
                      Alex Bell   Curmudgeon: DOA with SOA . . . . . . . . 56--ff

ACM Queue: Tomorrow's Computing Today
Volume 5, Number 2, March, 2007

                    John Stanik   News 2.0: Googlebombs Away; DST: This
                                  Year's Y2K?; Linux through Windows . . . 7--7
            George Neville-Neil   Kode vicious: APIs with an appetite  . . 8--10
                  Mache Creeger   Repurposing consumer hardware  . . . . . 12--13
                    John Stanik   Interview: a conversation with Cullen
                                  Jennings and Doug Wadkins  . . . . . . . 14--20
                  Robert Sparks   SIP: basics and beyond . . . . . . . . . 22--33
             David A. Bryan and   
              Bruce B. Lowekamp   Decentralizing SIP . . . . . . . . . . . 34--41
               Jason Fischl and   
              Hannes Tschofenig   Making SIP make cents  . . . . . . . . . 42--49
            Martin J. Steinmann   Unified communications with SIP  . . . . 50--55
          Shantanu Bhattacharya   Review of `Essential Software
                                  Architecture' by Ian Gorton,
                                  Springer-Verlag New York Inc., Secaucus,
                                  NJ, 2006, \$59.95, ISBN 3-540-28713-2}   56--56
               Brian D. Goodman   Review of `The Geek Gap: Why Business
                                  and Technology Professionals Don't
                                  Understand Each Other and Why They Need
                                  Each Other to Survive' by Bill Pfleging
                                  and Minda Zetlin, Prometheus Books,
                                  2006, \$25.00, ISBN 1-59102-415-3} . . . 56--56
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 58--58
              Stan Kelly-Bootle   Curmudgeon: As big as a barn?  . . . . . 64, 62--63

ACM Queue: Tomorrow's Computing Today
Volume 5, Number 3, April, 2007

                   James Maurer   From the Editors: Going forward  . . . . 8--8
                    John Stanik   News 2.0: Virtualization Reconsidered;
                                  The Power of PS3; Anti-P2P Software
                                  Targets Universities . . . . . . . . . . 10--10
            George Neville-Neil   Kode vicious: Advice to a newbie . . . . 12--14
                    John Stanik   Interview: a conversation with Cory
                                  Doctorow and Hal Stern . . . . . . . . . 16--23
                     Paul Vixie   DNS complexity . . . . . . . . . . . . . 24--29
                 Daniel E. Geer   The evolution of security  . . . . . . . 30--35
        Philip Papadopoulos and   
                 Greg Bruno and   
                     Mason Katz   Beyond Beowulf clusters  . . . . . . . . 36--43
                   S. Balaraman   Review of `Pro JSF and Ajax: Building
                                  Rich Internet Components' by Jonas
                                  Jacobi and John Fallows, Apress, 2006,
                                  \$49.99, ISBN 1-59059-580-7} . . . . . . 44--44
                     Radu State   Review of `Embedded Linux Primer: A
                                  Practical Real-world Approach' by
                                  Christopher Hallinan, Prentice Hall PTR,
                                  2006, \$44.99, ISBN 0-13-167984-8} . . . 44--44
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 46--46
              Stan Kelly-Bootle   Curmudgeon: Ode or code?: programmers be
                                  used!  . . . . . . . . . . . . . . . . . 52, 48--51

ACM Queue: Tomorrow's Computing Today
Volume 5, Number 4, May / June, 2007

         George V. Neville-Neil   Kode vicious: KV the loudmouth . . . . . 8--10
                  Mache Creeger   geek@home: Embracing wired networks  . . 12--15
                    John Stanik   Interview: a conversation with Michael
                                  Stonebraker and Margo Seltzer  . . . . . 16--23
                  Michi Henning   API design matters . . . . . . . . . . . 24--36
                      Bob Toxen   The seven deadly sins of Linux security  38--47
                    John O'Hara   Toward a commodity enterprise middleware 48--55
               Rafael Corchuelo   Review of `Expert VB 2005 Business
                                  Objects' (second edition) by Rockford
                                  Lhotka, Apress, 2006, \$59.99, ISBN
                                  1-59059-631-5} . . . . . . . . . . . . . 56--56
                   Will Wallace   Review of `Designing with Web Standards'
                                  (second edition) by Jeffrey Zeldman,
                                  Peachpit Press, 2006, \$44.99, ISBN
                                  0-321-38555-1} . . . . . . . . . . . . . 56--56
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 58--58
              Stan Kelly-Bootle   Curmudgeon: Alloneword . . . . . . . . . 64, 61--63

ACM Queue: Tomorrow's Computing Today
Volume 5, Number 5, July, 2007

                    John Stanik   Letters: Kudos to Curmudgeon; Long Live
                                  the Wire . . . . . . . . . . . . . . . . 8--8
         George V. Neville-Neil   Kode vicious: Gettin' your head straight 9--10
                    John Stanik   Interview: a conversation with Joel
                                  Spolsky  . . . . . . . . . . . . . . . . 12--20
         George V. Neville-Neil   Building secure Web applications . . . . 22--26
             Naveen Agarwal and   
               Scott Renfro and   
                   Arturo Bejar   Phishing forbidden . . . . . . . . . . . 28--32
           Vikram V. Ingleshwar   Usability testing for the Web  . . . . . 34--37
              Philippe Kruchten   Voyage in the agile memeplex . . . . . . 38--44
          Shantanu Bhattacharya   Review of `Enterprise Service-Oriented
                                  Architectures: Concepts, Challenges,
                                  Recommendations' by James McGovern,
                                  Oliver Sims, Ashish Jain, and Mark
                                  Little, Springer-Verlag, 2006, \$59.95,
                                  ISBN 1-4020-3704-X}  . . . . . . . . . . 46--46
           Andrea Paramithiotti   Review of `Hitchhiker's Guide to Visual
                                  Studio and SQL Server: Best Practice
                                  Architectures and Examples,' 7th edition
                                  (Microsoft Windows Server System Series)
                                  by William Vaugh and Peter Blackburn,
                                  Addison-Wesley Professional, 2006,
                                  \$59.99, ISBN 0-321-24362-5} . . . . . . 46--46
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 48--48
              Stan Kelly-Bootle   Curmudgeon: Some swans are black . . . . 52, 49--51

ACM Queue: Tomorrow's Computing Today
Volume 5, Number 6, September, 2007

                      Alex Bell   Opinion: Ground control to Architect Tom
                                  \ldots . . . . . . . . . . . . . . . . . 8--10
            George Neville-Neil   Kode vicious: The next big thing . . . . 11--12
                    John Stanik   Interview: a conversation with Jeff
                                  Bonwick and Bill Moore . . . . . . . . . 13--19
              Garth Goodson and   
               Sai Susharla and   
                     Rahul Iyer   Standardizing storage clusters . . . . . 20--27
                    Jon Elerath   Hard disk drives: the good, the bad and
                                  the ugly!  . . . . . . . . . . . . . . . 28--37
               Kostadis Roussos   Storage virtualization gets smart  . . . 38--44
                   S. Balaraman   Review of `Beginning POJOs: From Novice
                                  to Professional' by Brian Sam-Bodden,
                                  Apress, 2006, \$39.99, ISBN
                                  1-59059-596-3} . . . . . . . . . . . . . 45--45
                Diego R. Llanos   Review of `Grid Computing Security' by
                                  Anirban Chakrabarti, Springer, 2007,
                                  \$69.96, ISBN 3-540-44492-0} . . . . . . 45--45
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 46--46
              Stan Kelly-Bootle   Curmudgeon: The code delusion  . . . . . 52, 49--51

ACM Queue: Tomorrow's Computing Today
Volume 5, Number 7, November, 2007

         George V. Neville-Neil   Kode vicious: Take a freaking
                                  measurement! . . . . . . . . . . . . . . 7--8
                    John Stanik   Interview: a conversation with Mary Lou
                                  Jepsen . . . . . . . . . . . . . . . . . 9--15
                Matthew Garrett   Powering down  . . . . . . . . . . . . . 16--21
            Simson L. Garfinkel   Document & media exploitation . . . . . . 22--30
                     David Sohn   Understanding DRM  . . . . . . . . . . . 32--39
                Mark Callow and   
               Paul Beardow and   
                 David Brittain   Big games, small screens . . . . . . . . 40--50
                 Marc S. Gibian   Review of `Practical Subversion', Second
                                  Edition, by Daniel Berlin and Garrett
                                  Rooney, Apress, 2006, \$34.99, ISBN
                                  1-59059-753-2} . . . . . . . . . . . . . 51--51
                     O. Lecarme   Review of `Pro Drupal Development', by
                                  John VanDyk and Matt Westgate, Apress
                                  2007, \$44.99, ISBN 1-59059-755-9} . . . 51--51
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 52--52
              Stan Kelly-Bootle   Curmudgeon: Use it or lose it  . . . . . 56, 53--55


ACM Queue: Tomorrow's Computing Today
Volume 6, Number 1, January, 2008

            George Neville-Neil   Kode vicious: Poisonous programmers  . . 5--6
                    John Stanik   Interview: a conversation with Jason
                                  Hoffman  . . . . . . . . . . . . . . . . 7--13
                   Tom Killalea   Meet the virts . . . . . . . . . . . . . 14--18
                  Werner Vogels   Beyond server consolidation  . . . . . . 20--26
                 Ulrich Drepper   The cost of virtualization . . . . . . . 28--35
                    Scot Rixner   Network virtualization: breaking the
                                  performance barrier  . . . . . . . . . . 36--ff
                   Peter Kriens   How OSGi changed my life . . . . . . . . 44--51
              Stan Kelly-Bootle   Curmudgeon: All things being equal?  . . 56, 54--55

ACM Queue: Tomorrow's Computing Today
Volume 6, Number 2, March, 2008

                   James Maurer   From the Editors: Going digital  . . . . 7--7
            George Neville-Neil   Kode vicious: Latency and livelocks  . . 8--10
                    John Stanik   Interview: a conversation with Kurt
                                  Akeley and Pat Hanrahan  . . . . . . . . 11--17
          Kayvon Fatahalian and   
                   Mike Houston   GPUs: a closer look  . . . . . . . . . . 18--28
                     Chas. Boyd   Data-parallel computing  . . . . . . . . 30--39
              John Nickolls and   
                   Ian Buck and   
            Michael Garland and   
                  Kevin Skadron   Scalable parallel programming with CUDA  40--53
                   William Mark   Future graphics architectures  . . . . . 54--64
                Jose M. Ramirez   Review of `Enterprise Ajax: Strategies
                                  for Building High-performance Web
                                  Applications' by David Johnson, Alexei
                                  White, and Andre Charland, Prentice Hall
                                  PTR, 2008, \$39.99, ISBN 0-13-224206-0}  66--66
                Howard Whitston   Review of `Essential RenderMan' by Ian
                                  Stephenson, Springer-Verlag New York,
                                  Inc., 2008, \$39.95, ISBN 1-84628-344-2} 66--66
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 68--68
              Stan Kelly-Bootle   Curmudgeon: Solomon's sword beats
                                  Occam's razor  . . . . . . . . . . . . . 72, 69--71

ACM Queue: Tomorrow's Computing Today
Volume 6, Number 3, May / June, 2008

                   James Maurer   From the editors: a New Era  . . . . . . 7--7
            George Neville-Neil   Kode vicious: The Virtue of Paranoia . . 7--8
                   Terry Coatta   Interview: a conversation with Erik
                                  Meijer and Jose Blakeley . . . . . . . . 9--15
                  Craig Russell   Bridging the Object-Relational Divide    18--28
               Chris Richardson   ORM in Dynamic Languages . . . . . . . . 28--37
              Michael Keith and   
                 Randy Stafford   Exposing the Cache ORM . . . . . . . . . 38--47
                  Dan Pritchett   BASE: An ACID Alternative  . . . . . . . 48--55
                    Eric Allman   A Tribute to Jim Gray  . . . . . . . . . 56--57
                   Donna Carnes   Ode to a Sailor  . . . . . . . . . . . . 58--62
                       Jim Gray   Distributed Computing Economics  . . . . 63--68
               Harry J. Foxwell   Review of `The Definitive Guide to the
                                  Xen Hypervisor' (Prentice Hall Open
                                  Source Software Development Series),
                                  David Chisnall, Prentice Hall PTR, 2007,
                                  \$49.99, ISBN 0-13-234971-X} . . . . . . 69--69
                 Jeffrey Putnam   Review of `Practical MythTV: Building a
                                  PVR and Media Center PC', Stewart Smith
                                  and Michael Still, Apress, 2007,
                                  \$29.99, ISBN 1-59059-779-6} . . . . . . 69--69
              Stan Kelly-Bootle   Curmudgeon: There's a Lot of It About    72--ff

ACM Queue: Tomorrow's Computing Today
Volume 6, Number 4, jul # / # aug, 2008

            George Neville-Neil   Kode vicious: Sizing your System . . . . 6--7
                    John Stanik   Interview: a conversation with Steve
                                  Bourne, Eric Allman, and Bryan Cantrill  8--15
                 Bryan Cantrill   A Pioneer's Flash of Insight . . . . . . 16--17
                   Jim Gray and   
                 Bob Fitzgerald   Flash Disk Opportunity for Server
                                  Applications . . . . . . . . . . . . . . 18--23
                 Adam Leventhal   Flash Storage Today  . . . . . . . . . . 24--30
             Mark Moshayedi and   
               Patrick Wilkison   Enterprise SSDs  . . . . . . . . . . . . 32--39
                   Goetz Graefe   The Five-minute Rule 20 Years Later: and
                                  How Flash Memory Changes the Rules . . . 40--52
             David B. Henderson   Review of \em Botnet Detection:
                                  Countering the Largest Security Threat
                                  (Advances in Information Security) Wenke
                                  Lee, Cliff Wang, David Dagon,
                                  Springer-Verlag New York Inc., 2007,
                                  \$99.00, ISBN: 0-387-68766-1}  . . . . . 53--53
                   Annika Hinze   Review of \em RailsSpace: Building a
                                  Social Networking Website with Ruby on
                                  Rails, (Addison-Wesley Professional Ruby
                                  Series) Michael Hartl, Aurelius
                                  Prochazka, Addison-Wesley Professional,
                                  2007, \$44.99, ISBN 0-321-48079-1} . . . 53--53
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 54--54
              Stan Kelly-Bootle   Curmudgeon: The Fabrication of Reality   56--58

ACM Queue: Tomorrow's Computing Today
Volume 6, Number 5, September, 2008

            George Neville-Neil   Kode vicious: Beautiful Code Exists, If
                                  You Know Where to Look . . . . . . . . . 4--7
                    John Stanik   Interview: a Conversation with Steve
                                  Bourne, Eric Allman, and Bryan Cantrill  8--15
             Bryan Cantrill and   
                   Jeff Bonwick   Real-world Concurrency . . . . . . . . . 16--25
                     Jim Larson   Erlang for Concurrent Programming  . . . 18--23
                 Ulrich Drepper   Parallel Programming with Transactional
                                  Memory . . . . . . . . . . . . . . . . . 38--45
             Calin Cascaval and   
             Colin Blundell and   
              Maged Michael and   
             Harold W. Cain and   
                    Peng Wu and   
            Stefanie Chiras and   
          Siddhartha Chatterjee   Software Transactional Memory: why is it
                                  only a research toy? . . . . . . . . . . 46--58
                  David G. Hill   Review of \em Eating the IT Elephant:
                                  Moving from Greenfield Development to
                                  Brownfield (1st ed.), IBM Press, 2008,
                                  \$29.99, ISBN 0-13-713012-0} . . . . . . 59--59
                  David Naugler   Review of \em Pro WPF in C# 2008:
                                  Windows Presentation Foundation with
                                  .NET 3.5, (2nd ed.),' Apress, 2008,
                                  \$54.99, ISBN 1-59059-955-1} . . . . . . 59--59
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 60--60
              Stan Kelly-Bootle   Curmudgeon: Affine Romance . . . . . . . 61--63

ACM Queue: Tomorrow's Computing Today
Volume 6, Number 6, October, 2008

            George Neville-Neil   Kode vicious: Get Real about Realtime    6--9
                   Tom Killalea   Building Scalable Web Services . . . . . 10--13
                  Werner Vogels   Eventually Consistent  . . . . . . . . . 14--19
                   Tom Leighton   Improving Performance on the Internet    20--29
                  Steve Souders   High Performance Web Sites . . . . . . . 30--37
                   Steve Bourne   CTO Roundtable STORAGE . . . . . . . . . 38--45
                 Erik Wilde and   
              Robert J. Glushko   XML Fever  . . . . . . . . . . . . . . . 46--53
                      J. Miller   Book Review: Practical API Design:
                                  Confessions of a Java Framework
                                  Architect (1st edition), Jaroslav
                                  Tulach, Apress, 2008, \$74.99, ISBN:
                                  978-1-4302-0973-7} . . . . . . . . . . . 54--54
                    Markus Wolf   Book Review: Concurrent and Real-time
                                  Programming in Ada (3rd edition), Alan
                                  Burns, Andy Wellings, Cambridge
                                  University Press, 2007, \$75.00, ISBN:
                                  978-0-521-86697-2} . . . . . . . . . . . 54--54
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 55--55

ACM Queue: Tomorrow's Computing Today
Volume 6, Number 7, nov # / # dec, 2008

            George Neville-Neil   Debugging Devices  . . . . . . . . . . . 6--9
                      Jim Waldo   Scaling in Games & Virtual Worlds . . . . 10--16
               Walker White and   
             Christoph Koch and   
            Johannes Gehrke and   
                    Alan Demers   Better Scripts, Better Games . . . . . . 18--25
         George V. Neville-Neil   Code Spelunking Redux  . . . . . . . . . 26--33
                  Mache Creeger   CTO roundtable storage: part two . . . . 34--40
                   David Bellin   Review of \em The Rails Way by Obie
                                  Fernandez, Addison-Wesley Professional,
                                  2007, \$49.99, ISBN: 978-0-321-44561-2}  41--41
                  David Naugler   Review of \em Pro LINQ Object Relational
                                  Mapping in C# 2008 by Vijay Mehta,
                                  Apress, 2008, \$49.99, ISBN:
                                  978-1-59059-965-5} . . . . . . . . . . . 41--41
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 42--42


ACM Queue: Tomorrow's Computing Today
Volume 7, Number 1, January, 2009

         George V. Neville-Neil   Kode vicious: Pride and Prejudice: (The
                                  \em Vasa)  . . . . . . . . . . . . . . . 6--7
                    John Stanik   Interview: a Conversation with Van
                                  Jacobson . . . . . . . . . . . . . . . . 8--16
                   Mike Shapiro   Purpose-Built Languages  . . . . . . . . 18--24
                  Mache Creeger   CTO roundtable: Virtualization: Part One 26--35
                  Benjamin Boer   The Obama Campaign: a Programmer's
                                  Perspective  . . . . . . . . . . . . . . 36--39
                   S. Balaraman   Book review: Review of \em Pro Web 2.0
                                  Application Development with GWT by Jeff
                                  Dwyer, Apress, 2008, \$44.99, ISBN
                                  978-1-59059-985-3} . . . . . . . . . . . 40--40
               Alessandro Berni   Review of \em Wireless Ad Hoc and Sensor
                                  Networks (1st ed) by Houda Labiod, John
                                  Wiley & Sons, Inc., 2008, \$165.00, ISBN
                                  1-84821-003-5} . . . . . . . . . . . . . 40--40
                    John Stanik   Calendar . . . . . . . . . . . . . . . . 41--41
              Stan Kelly-Bootle   Curmudgeon: The Flaws of Nature  . . . . 42--45
                   Jeff Norwalk   Making the Move to AJAX  . . . . . . . . 1:1--1:??
                  Peter Christy   Commentary: a Trip Without a Roadmap . . 2:1--2:??
                   Eric Schrock   Debugging AJAX in Production . . . . . . 3:1--3:??

ACM Queue: Tomorrow's Computing Today
Volume 7, Number 2, February, 2009

                   James Maurer   Introducing \ldots \tt acmqueue  . . . . 5--5
         George V. Neville-Neil   Kode Vicious: Don't be Typecast as a
                                  Software Developer . . . . . . . . . . . 6--9
                 Bryan Cantrill   Interview: a Conversation with Arthur
                                  Whitney  . . . . . . . . . . . . . . . . 12--13
              Thomas Wadlow and   
                   Vlad Gorelik   Security in the Browser  . . . . . . . . 40--41
               Niels Provos and   
           Moheeb Abu Rajab and   
         Panayiotis Mavrommatis   Cybercrime 2.0: When the Cloud Turns
                                  Dark . . . . . . . . . . . . . . . . . . 46--47
                 Ian Foster and   
         Savas Parastatidis and   
                Paul Watson and   
                   Mark McKeown   How Do I Model State? Let Me Count the
                                  Ways . . . . . . . . . . . . . . . . . . 54--55
              Matt Zandstra and   
                  Robert Martin   Book Reviews: \em PHP Objects, Patterns,
                                  and Practice (second edition), Matt
                                  Zandstra, Apress, 2007, \$44.99, ISBN
                                  1-59059-909-8}, {{\em Clean Code: A
                                  Handbook of Agile Software
                                  Craftsmanship}, Robert Martin, Prentice
                                  Hall PTR, 2008, \$42.99, ISBN
                                  0-13-235088-2  . . . . . . . . . . . . . 75--75
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 76--76

ACM Queue: Tomorrow's Computing Today
Volume 7, Number 3, April, 2009

             Charles Beeler and   
                Craig Partridge   Opinion: All-Optical Computing and
                                  All-Optical Networks are Dead  . . . . . 10--11
              Jonathan M. Smith   Fighting Physics: a Tough Battle . . . . 20--21
                    Mike O'Dell   Network Front-end Processors, Yet Again  28--29

ACM Queue: Tomorrow's Computing Today
Volume 7, Number 4, May, 2009

         George V. Neville-Neil   Whither Sockets? . . . . . . . . . . . . 34--35

ACM Queue: Tomorrow's Computing Today
Volume 7, Number 2, February, 2009

              Stan Kelly-Bootle   Curmudgeon: One Peut-Être, Two Peut-Être,
                                  Three Peut-Être, More . . . . . . . . . . 77--80

ACM Queue: Tomorrow's Computing Today
Volume 7, Number 5, June, 2009

              Werner Vogels and   
                 Greg Olsen and   
                 Lew Tucker and   
                Greg Badros and   
               Geir Ramleth and   
                   Steve Bourne   CTO roundtable: Cloud Computing  . . . . 1:1--1:18
                  Mache Creeger   Cloud Computing: An Overview: Part Two   2:1--2:??
               Charles Reis and   
                 Adam Barth and   
                  Carlos Pizano   Browser Security: Lessons from Google
                                  Chrome . . . . . . . . . . . . . . . . . 3:1--3:8

ACM Queue: Tomorrow's Computing Today
Volume 7, Number 6, July, 2009

                    Adam Jacobs   The Pathologies of Big Data  . . . . . . 1:1--1:10

ACM Queue: Tomorrow's Computing Today
Volume 7, Number 7, August, 2009

     Marshall Kirk McKusick and   
                   Sean Quinlan   Case Study: GFS: Evolution on
                                  Fast-forward . . . . . . . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 7, Number 8, September, 2009

           Whitfield Diffie and   
                   Susan Landau   Communications Surveillance: Privacy and
                                  Security at Risk . . . . . . . . . . . . 10
                   Pat Hanrahan   A Conversation with David Shaw . . . . . 20--21
                   Pat Hanrahan   A Conversation with David Shaw --- Audio
                                  Clip . . . . . . . . . . . . . . . . . . ??

ACM Queue: Tomorrow's Computing Today
Volume 7, Number 9, October, 2009

                  Jim Waldo and   
                 Alan Ramos and   
                Weina Scott and   
              William Scott and   
                 Doug Lloyd and   
              Katherine O'Leary   A Threat Analysis of RFID Passports  . . 10
       Matthew T. Dougherty and   
            Michael J. Folk and   
                 Erez Zadok and   
       Herbert J. Bernstein and   
       Frances C. Bernstein and   
          Kevin W. Eliceiri and   
              Werner Benger and   
                 Christoph Best   Unifying Biological Image Formats with
                                  HDF5 . . . . . . . . . . . . . . . . . . 20
          James C. Phillips and   
                  John E. Stone   Probing Biomolecular Machines with
                                  Graphics Processors  . . . . . . . . . . 30
         Samantha Kleinberg and   
                     Bud Mishra   Metamorphosis: the Coming Transformation
                                  of Translational Systems Biology . . . . 40
              Paul Stachour and   
            David Collier-Brown   You Don't Know Jack About Software
                                  Maintenance  . . . . . . . . . . . . . . 50
            George Neville-Neil   Kode Vicious: Merge Early, Merge Often   60--62

ACM Queue: Tomorrow's Computing Today
Volume 7, Number 10, November, 2009

                     Paul Vixie   What DNS Is Not  . . . . . . . . . . . . 10
             Stephen Petschulat   Other People's Data  . . . . . . . . . . 20
         Alexandra Fedorova and   
           Juan Carlos Saez and   
            Daniel Shelepov and   
                  Manuel Prieto   Maximizing Power Efficiency with
                                  Asymmetric Multicore Systems . . . . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 7, Number 11, December, 2009

              Stan Kelly-Bootle   Curmudgeon: Some Rules and Restrictions
                                  May Apply  . . . . . . . . . . . . . . . 1--3
                    Julian Hyde   Data in Flight . . . . . . . . . . . . . 20
                 Adam Leventhal   Triple-Parity RAID and Beyond  . . . . . 30
            George Neville-Neil   Kode Vicious: Standards Advice . . . . . 40--43


ACM Queue: Tomorrow's Computing Today
Volume 8, Number 1, January, 2010

                      Eric Saxe   Power-Efficient Software . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 8, Number 2, February, 2010

                    David Brown   Interview: a Conversation with Steve
                                  Furber . . . . . . . . . . . . . . . . . 1--8
            George Neville-Neil   Kode Vicious: Commitment Issues  . . . . 20--22
             David J. Brown and   
                  Charles Reams   Toward Energy-Efficient Computing  . . . 30
                  Mache Creeger   CTO Roundtable: Malware Defense  . . . . 40

ACM Queue: Tomorrow's Computing Today
Volume 8, Number 3, March, 2010

                     Andy Woods   Cooling the Data Center  . . . . . . . . 10
            George Neville-Neil   Kode Vicious: Broken Builds  . . . . . . 20
                      Anonymous   A Conversation with Jeff Heer, Martin
                                  Wattenberg, and Fernanda Viégas . . . . . 1--8
                 Peter Phillips   Enhanced Debugging with Traces . . . . . 1--6

ACM Queue: Tomorrow's Computing Today
Volume 8, Number 4, April, 2010

                George Phillips   Simplicity Betrayed  . . . . . . . . . . 10
                    Dave Durkee   Why Cloud Computing Will Never Be Free   1--10
              Julien Ridoux and   
                  Darryl Veitch   Principles of Robust Timing over the
                                  Internet . . . . . . . . . . . . . . . . 1--14
               Jeffrey Heer and   
            Michael Bostock and   
               Vadim Ogievetsky   A Tour through the Visualization Zoo . . 40
            George Neville-Neil   Kode Vicious: Avoiding Obsolescence  . . 50

ACM Queue: Tomorrow's Computing Today
Volume 8, Number 5, May, 2010

                   Dustin Owens   Securing Elasticity in the Cloud . . . . 1--7
               Jeffrey Heer and   
            Michael Bostock and   
               Vadim Ogievetsky   A Tour through the Visualization Zoo . . 20
                  Brendan Gregg   Visualizing System Latency . . . . . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 8, Number 6, June, 2010

            George Neville-Neil   Kode Vicious: Collecting Counters  . . . 10
              Poul-Henning Kamp   You're Doing It Wrong  . . . . . . . . . 20
                     Eugene Loh   The Ideal HPC Programming Language . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 8, Number 7, July, 2010

              Robert DeLine and   
               Gina Venolia and   
                     Kael Rowan   Software Development with Code Maps  . . 10
                  Mache Creeger   Moving to the Edge: An ACM CTO
                                  Roundtable on Network Virtualization . . 20
         George V. Neville-Neil   Lessons from the Letter  . . . . . . . . 30
                  Mache Creeger   Moving to the Edge: CTO Roundtable
                                  Overview . . . . . . . . . . . . . . . . 40

ACM Queue: Tomorrow's Computing Today
Volume 8, Number 8, August, 2010

                  Steve Chessin   Injecting Errors for Fun and Profit  . . 10
            Stephen V. Cantrill   Computers in Patient Care: The Promise
                                  and the Challenge  . . . . . . . . . . . 20
            George Neville-Neil   Kode Vicious: a Paucity of Ports . . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 8, Number 9, September, 2010

                   Cary Millsap   Thinking Clearly about Performance . . . 1--10
                  Clem Cole and   
               Russell Williams   Photoshop Scalability: Keeping It Simple 20
                 Kevin Montagne   Tackling Architectural Complexity with
                                  Modeling . . . . . . . . . . . . . . . . 30
              Stan Kelly-Bootle   Curmudgeon: Facing an Uncertain Past . . 40

ACM Queue: Tomorrow's Computing Today
Volume 8, Number 10, October, 2010

          David S. H. Rosenthal   Keeping Bits Safe: How Hard Can It Be?   1--10

ACM Queue: Tomorrow's Computing Today
Volume 8, Number 11, November, 2010

                  Mache Creeger   The Theft of Business Innovation: An
                                  ACM--BCS Roundtable on Threats to Global
                                  Competitiveness  . . . . . . . . . . . . 10
                  Mache Creeger   The Theft of Business Innovation:
                                  Overview . . . . . . . . . . . . . . . . 20
                  Mache Creeger   A Conversation with Ed Catmull . . . . . 30
           Evangelos Kotsovinos   Virtualization: Blessing or Curse? . . . 40
               Terry Coatta and   
                  Julian Gosper   UX Design and Agile: a Natural Fit?  . . 50

ACM Queue: Tomorrow's Computing Today
Volume 8, Number 12, December, 2010

              Eben M. Haber and   
              Eser Kandogan and   
                    Paul Maglio   Collaboration in System Administration   10
         George V. Neville-Neil   Bound by the Speed of Light  . . . . . . 20
           Thomas A. Limoncelli   A Plea to Software Vendors from
                                  Sysadmins --- 10 Do's and Don'ts . . . . 30


ACM Queue: Tomorrow's Computing Today
Volume 9, Number 1, January, 2011

                 Christina Lear   System Administration Soft Skills  . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 9, Number 2, February, 2011

              Stan Kelly-Bootle   Two Books Alike in Dignity . . . . . . . 10
              Poul-Henning Kamp   B.Y.O.C. (1,342 Times and Counting)  . . 20
             Jonathan Parri and   
             Daniel Shapiro and   
              Miodrag Bolic and   
                    Voicu Groza   Returning Control to the Programmer:
                                  SIMD Intrinsics for Virtual Machines . . 30

ACM Queue: Tomorrow's Computing Today
Volume 9, Number 3, March, 2011

            George Neville-Neil   Porting with Autotools . . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 9, Number 4, April, 2011

                      Anonymous   Jim Gray --- A Talk with THE SQL Guru
                                  and Architect  . . . . . . . . . . . . . 40
              Poul-Henning Kamp   The One-second War (What Time Will You
                                  Die?)  . . . . . . . . . . . . . . . . . 10
             Andre Charland and   
                   Brian LeRoux   Mobile Application Development: Web vs.
                                  Native . . . . . . . . . . . . . . . . . 20
                    Michael Rys   Scalable SQL . . . . . . . . . . . . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 9, Number 5, May, 2011

            George Neville-Neil   Storage Strife . . . . . . . . . . . . . 10
      Roberto Ierusalimschy and   
Luiz Henrique de Figueiredo and   
                 Waldemar Celes   Passing a Language through the Eye of a
                                  Needle . . . . . . . . . . . . . . . . . 20
                David Rosenthal   Deduplicating Devices Considered Harmful 30

ACM Queue: Tomorrow's Computing Today
Volume 9, Number 6, June, 2011

                 Debasish Ghosh   DSL for the Uninitiated  . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 9, Number 7, July, 2011

                      Oren Eini   The Pain of Implementing LINQ Providers  10

ACM Queue: Tomorrow's Computing Today
Volume 9, Number 8, August, 2011

                  Mache Creeger   ACM CTO Roundtable on Mobile Devices in
                                  the Enterprise . . . . . . . . . . . . . 10
                  Mache Creeger   Mobile Devices in the Enterprise: CTO
                                  Roundtable Overview  . . . . . . . . . . 20
            George Neville-Neil   How to Improve Security? . . . . . . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 9, Number 9, September, 2011

              Poul-Henning Kamp   The Software Industry IS the Problem:
                                  The time has come for software liability
                                  laws . . . . . . . . . . . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 9, Number 10, October, 2011

                  David Pacheco   Postmortem Debugging in Dynamic
                                  Environments . . . . . . . . . . . . . . 12
          G. Bruce Berriman and   
                Steven L. Groom   How Will Astronomy Archives Survive the
                                  Data Tsunami?  . . . . . . . . . . . . . 21
            George Neville-Neil   Wanton Acts of Debuggery . . . . . . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 9, Number 11, November, 2011

               Robert Green and   
                  Henry Ledgard   Coding Guidelines: Finding the Art in
                                  the Science  . . . . . . . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 9, Number 12, December, 2011

                  Vint Cerf and   
               Van Jacobson and   
                Nick Weaver and   
                     Jim Gettys   BufferBloat: What's Wrong with the
                                  Internet?  . . . . . . . . . . . . . . . 10
            George Neville-Neil   Code Rototilling . . . . . . . . . . . . 20


ACM Queue: Tomorrow's Computing Today
Volume 10, Number 1, January, 2012

         George V. Neville-Neil   The Network Protocol Battle: a tale of
                                  hubris and zealotry  . . . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 10, Number 2, February, 2012

                     Jim Gettys   Home Bufferbloat Demonstration Videos    10

ACM Queue: Tomorrow's Computing Today
Volume 10, Number 3, March, 2012

                    Eric Allman   Managing Technical Debt  . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 10, Number 4, April, 2012

            Andrew Danowitz and   
                Kyle Kelley and   
                  James Mao and   
          John P. Stevenson and   
                  Mark Horowitz   CPU DB: Recording Microprocessor History 18

ACM Queue: Tomorrow's Computing Today
Volume 10, Number 5, May, 2012

                Dennis Abts and   
                  Bob Felderman   A Guided Tour through Data-Center
                                  Networking . . . . . . . . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 10, Number 6, June, 2012

            George Neville-Neil   A Nice Piece of Code . . . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 10, Number 7, July, 2012

             Manuel Serrano and   
            Gérard Berry   Multitier Programming in Hop . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 10, Number 8, August, 2012

         George V. Neville-Neil   Can More Code Mean Fewer Bugs? . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 10, Number 9, September, 2012

         Marshall Kirk McKusick   Disks from the Perspective of a File
                                  System . . . . . . . . . . . . . . . . . 1--3

ACM Queue: Tomorrow's Computing Today
Volume 10, Number 10, October, 2012

               Michael Cornwell   Anatomy of a Solid-State Drive . . . . . ??
                Aiman Erbad and   
                 Charles Krasic   Sender-side Buffers and the Case for
                                  Multimedia Adaptation  . . . . . . . . . ??
            George Neville-Neil   Queue Portrait: Robert Watson  . . . . . ??

ACM Queue: Tomorrow's Computing Today
Volume 10, Number 11, November, 2012

                      Anonymous   The Web Won't Be Safe or Secure until We
                                  Break It . . . . . . . . . . . . . . . . ??

ACM Queue: Tomorrow's Computing Today
Volume 10, Number 12, December, 2012

                      Anonymous   Node Summit: The Importance of Cross
                                  Platform . . . . . . . . . . . . . . . . ??


ACM Queue: Tomorrow's Computing Today
Volume 11, Number 1, January, 2013

                 Arun Kumar and   
                   Feng Niu and   
          Christopher Ré   Hazy: Making it Easier to Build and
                                  Maintain Big-data Analytics  . . . . . . 1--17
                Kate Matsudaira   Making the Mobile Web Faster . . . . . . 1--9
            George Neville-Neil   Kode Vicious: Divided by Division  . . . 1--3
            Robert N. M. Watson   A Decade of OS Access-control
                                  Extensibility  . . . . . . . . . . . . . 1--22

ACM Queue: Tomorrow's Computing Today
Volume 11, Number 2, February, 2013

              Brian Beckman and   
                    Erik Meijer   The Story of the Teapot in DHTML . . . . 1--10

ACM Queue: Tomorrow's Computing Today
Volume 11, Number 3, March, 2013

                Latanya Sweeney   Discrimination in Online Ad Delivery . . 10

ACM Queue: Tomorrow's Computing Today
Volume 11, Number 4, April, 2013

            George Neville-Neil   Kode Vicious: Cherry-picking and the
                                  Scientific Method  . . . . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 11, Number 5, May, 2013

                   Terry Coatta   Queue Portrait: Kate Matsudaira  . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 11, Number 6, June, 2013

            George Neville-Neil   Kode Vicious: The Naming of Hosts is a
                                  Difficult Matter; Also, the perils of
                                  premature rebooting  . . . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 11, Number 7, July, 2013

              Poul-Henning Kamp   More Encryption Is Not the Solution  . . 10

ACM Queue: Tomorrow's Computing Today
Volume 11, Number 8, August, 2013

            George Neville-Neil   Kode Vicious: A Lesson in Resource
                                  Management . . . . . . . . . . . . . . . 10:10--10:12

ACM Queue: Tomorrow's Computing Today
Volume 11, Number 9, September, 2013

                  Neil Mitchell   Leaking Space  . . . . . . . . . . . . . 1--14

ACM Queue: Tomorrow's Computing Today
Volume 11, Number 10, October, 2013

            George Neville-Neil   Kode Vicious: Bugs and Bragging Rights   1--3

ACM Queue: Tomorrow's Computing Today
Volume 11, Number 11, November, 2013

                   Alex E. Bell   The Software Inferno . . . . . . . . . . 10

ACM Queue: Tomorrow's Computing Today
Volume 11, Number 12, December, 2013

              Nick Feamster and   
           Jennifer Rexford and   
                   Ellen Zegura   The Road to SDN  . . . . . . . . . . . . ??
            Zachary Hensley and   
         Jibonananda Sanyal and   
                     Joshua New   Provenance in Sensor Data Management . . ??
                      Anonymous   Node at LinkedIn: The Pursuit of
                                  Thinner, Lighter, Faster . . . . . . . . ??
            George Neville-Neil   Kode Vicious: This is the Foo Field  . . ??
              Poul-Henning Kamp   Center Wheel for Success . . . . . . . . 10


ACM Queue: Tomorrow's Computing Today
Volume 12, Number 1, January, 2014

             Robert Sproull and   
                      Jim Waldo   The API Performance Contract . . . . . . 10
                     Andi Kleen   Scaling Existing Lock-based Applications
                                  with Lock Elision  . . . . . . . . . . . 20
             Wojciech Golab and   
         Muntasir R. Rahman and   
              Alvin AuYoung and   
            Kimberly Keeton and   
            Xiaozhou (Steve) Li   Eventually Consistent: Not What You Were
                                  Expecting? . . . . . . . . . . . . . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 12, Number 2, February, 2014

                     Paul Vixie   Rate-limiting State  . . . . . . . . . . 10
              Ivar Jacobson and   
                 Pan-Wei Ng and   
                 Ian Spence and   
                Paul E. McMahon   Major-league SEMAT: Why Should an
                                  Executive Care?  . . . . . . . . . . . . 20
            George Neville-Neil   Kode Vicious: The Logic of Logging . . . 30
           Christoph Paasch and   
            Olivier Bonaventure   Multipath TCP  . . . . . . . . . . . . . 40
                    Erik Meijer   Evolution of Javascript Revisited  . . . 50
                    Erik Meijer   Why Large Scale Mobile and E-Commerce
                                  Apps use \tt Node.js . . . . . . . . . . 60
                    Eran Hammer   Notes from the Battlefield (\tt Node.js
                                  at Walmart)  . . . . . . . . . . . . . . 70
                      Anonymous   Release the Kraken: a Story of \tt
                                  Node.js in the Enterprise (PayPal) . . . 80
                      Anonymous   Riding the N(ode) Train (Groupon)  . . . 90
            Manish Vachharajani   Embedding \tt Node.js into a
                                  High-performance Network Datapath  . . . 100
                      Anonymous   \tt Node.js in the Digital Media
                                  Universe . . . . . . . . . . . . . . . . 110

ACM Queue: Tomorrow's Computing Today
Volume 12, Number 3, March, 2014

              Lucian Carata and   
              Sherif Akoush and   
      Nikilesh Balakrishnan and   
            Thomas Bytheway and   
             Ripduman Sohan and   
              Margo Seltzer and   
                    Andy Hopper   A Primer on Provenance . . . . . . . . . 10
              Poul-Henning Kamp   Please Put OpenSSL Out of Its Misery . . 20
                Wyatt Lloyd and   
        Michael J. Freedman and   
           Michael Kaminsky and   
              David G. Andersen   Don't Settle for Eventual Consistency    30
                      Bob Toxen   The NSA and Snowden: Securing the
                                  All-Seeing Eye . . . . . . . . . . . . . 40

ACM Queue: Tomorrow's Computing Today
Volume 12, Number 4, April, 2014

            George Neville-Neil   Kode Vicious: Forked Over  . . . . . . . 10
                    Erik Meijer   The Curse of the Excluded Middle . . . . 20
                      Andy Gill   Domain-specific Languages and Code
                                  Synthesis Using Haskell  . . . . . . . . 30
           Bo Joel Svensson and   
               Mary Sheeran and   
                    Ryan Newton   Design Exploration through
                                  Code-generating DSLs . . . . . . . . . . 40

ACM Queue: Tomorrow's Computing Today
Volume 12, Number 5, May, 2014

                     Mike Bland   Finding More Than One Worm in the Apple  10
               Terry Coatta and   
              Michael Donat and   
                   Jafar Husain   Automated QA Testing at EA: Driven by
                                  Events . . . . . . . . . . . . . . . . . 20
                  Thomas Wadlow   Who Must You Trust?  . . . . . . . . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 12, Number 6, June, 2014

              Poul-Henning Kamp   The Bikeshed: Quality Software Costs
                                  Money --- Heartbleed Was Free  . . . . . 10
            George Neville-Neil   Kode Vicious: Outsourcing Responsibility 20
            Michael J. Lutz and   
         J. Fernando Naveda and   
               James R. Vallino   Undergraduate Software Engineering:
                                  Addressing the Needs of Professional
                                  Software Development . . . . . . . . . . 30
                Mark Cavage and   
                  David Pacheco   Bringing Arbitrary Compute to
                                  Authoritative Data . . . . . . . . . . . 40

ACM Queue: Tomorrow's Computing Today
Volume 12, Number 7, July, 2014

                 Vinton G. Cerf   ACM and the Professional Programmer  . . 10
               Peter Bailis and   
                 Kyle Kingsbury   The Network is Reliable  . . . . . . . . 20
              Jon P. Daries and   
               Justin Reich and   
                  Jim Waldo and   
             Elise M. Young and   
      Jonathan Whittinghill and   
       Daniel Thomas Seaton and   
             Andrew Dean Ho and   
                   Isaac Chuang   Privacy, Anonymity, and Big Data in the
                                  Social Sciences  . . . . . . . . . . . . 30
                 Christoph Kern   Securing the Tangled Web . . . . . . . . 40

ACM Queue: Tomorrow's Computing Today
Volume 12, Number 8, August, 2014

                     Ben Laurie   Certificate Transparency . . . . . . . . 10
                Sharon Goldberg   Why Is It Taking So Long to Secure
                                  Internet Routing?  . . . . . . . . . . . 20
                Axel Arnbak and   
               Hadi Asghari and   
           Michel Van Eeten and   
                  Nico Van Eijk   Security Collapse in the HTTPS Market    30

ACM Queue: Tomorrow's Computing Today
Volume 12, Number 9, September, 2014

            George Neville-Neil   Port Squatting . . . . . . . . . . . . . 10
                       Alex Liu   JavaScript and the Netflix User
                                  Interface  . . . . . . . . . . . . . . . 20
           John T. Richards and   
            Jonathan Brezin and   
            Calvin B. Swart and   
         Christine A. Halverson   Productivity in Parallel Programming: a
                                  Decade of Progress . . . . . . . . . . . 30
                    Ellen Chisa   Evolution of the Product Manager . . . . 40

ACM Queue: Tomorrow's Computing Today
Volume 12, Number 10, October, 2014

                Erik Meijer and   
                  Vikram Kapoor   The Responsive Enterprise: Embracing the
                                  Hacker Way . . . . . . . . . . . . . . . 10
                 David Chisnall   There's No Such Thing as a
                                  General-purpose Processor  . . . . . . . 20
              Ivar Jacobson and   
                   Ed Seidewitz   A New Software Engineering . . . . . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 12, Number 11, November, 2014

            George Neville-Neil   Too Big to Fail  . . . . . . . . . . . . 10
                Rick Richardson   Disambiguating Databases . . . . . . . . 20
           Geetanjali Sampemane   Internal Access Controls . . . . . . . . 30
                Davidlohr Bueso   Scalability Techniques for Practical
                                  Synchronization Primitives . . . . . . . 40


ACM Queue: Tomorrow's Computing Today
Volume 13, Number 1, December / January, 2014--2015

              Poul-Henning Kamp   HTTP\slash 2.0 --- The IETF is Phoning
                                  It In  . . . . . . . . . . . . . . . . . 10
                   Harlan Stenn   Securing the Network Time Protocol . . . 20
                     Paul Vixie   Go Static or Go Home . . . . . . . . . . 30
           Robert V. Binder and   
              Bruno Legeard and   
                    Anne Kramer   Model-based Testing: Where Does It
                                  Stand? . . . . . . . . . . . . . . . . . 40
                      Dave Long   META II: Digital Vellum in the Digital
                                  Scriptorium  . . . . . . . . . . . . . . 50

ACM Queue: Tomorrow's Computing Today
Volume 13, Number 2, February, 2015

              Poul-Henning Kamp   HTTP/2.0 --- The IETF is Phoning It In   10
            George Neville-Neil   Kode Vicious: Raw Networking . . . . . . 20
                     Paul Vixie   Go Static or Go Home . . . . . . . . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 13, Number 3, March, 2015

                Spencer Rathbun   Parallel Processing with Promises  . . . 10
                  Justin Sheehy   There is No Now  . . . . . . . . . . . . 20
\vSt\vepán Davidovi\vc and   
                 Kavita Guliani   Reliable Cron across the Planet  . . . . 30
                Erik Meijer and   
             Kevin Millikin and   
                   Gilad Bracha   Spicing Up Dart with Side Effects  . . . 40

ACM Queue: Tomorrow's Computing Today
Volume 13, Number 4, April, 2015

                 Daniel C. Wang   From the EDVAC to WEBVACs  . . . . . . . 10
             Phelim Dowling and   
                  Kevin McGrath   Using Free and Open Source Tools to
                                  Manage Software Quality  . . . . . . . . 20
                Kate Matsudaira   The Science of Managing Data Science . . 30
                   Andrew Brook   Evolution and Practice: Low-latency
                                  Distributed Applications in Finance  . . 40

ACM Queue: Tomorrow's Computing Today
Volume 13, Number 5, May, 2015

            George Neville-Neil   Kode Vicious: Lazarus Code . . . . . . . 10
               Neil Gunther and   
                Paul Puglia and   
            Kristofer Tomasette   Hadoop Superlinear Scalability . . . . . 20
                    Rich Harris   Dismantling the Barriers to Entry  . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 13, Number 6, June, 2015

            George Neville-Neil   Kode Vicious: Hickory Dickory Doc: On
                                  null encryption and automated
                                  documentation  . . . . . . . . . . . . . 10
               Arie van Deursen   Beyond Page Objects: Testing Web
                                  Applications with State Objects  . . . . 20
               Spence Green and   
               Jeffrey Heer and   
         Christopher D. Manning   Natural Language Translation at the
                                  Intersection of AI and HCI . . . . . . . 30

ACM Queue: Tomorrow's Computing Today
Volume 13, Number 7, July, 2015

                  Philip Maddox   Testing a Distributed System . . . . . . 10
Thanumalayan Sankaranarayana Pillai and   
          Vijay Chidambaram and   
       Ramnatthan Alagappan and   
           Samer Al-Kiswany and   
   Andrea C. Arpaci-Dusseau and   
        Remzi H. Arpaci-Dusseau   Crash Consistency  . . . . . . . . . . . 20

ACM Queue: Tomorrow's Computing Today
Volume 13, Number 8, September / October, 2015

        George Neville-Neil and   
                   Steve Bourne   Version Status: Still Finding the Right
                                  Questions  . . . . . . . . . . . . . . . 10
                 Tyler McMullen   It Probably Works  . . . . . . . . . . . 15
             Olivia Angiuli and   
             Joe Blitzstein and   
                      Jim Waldo   How to De-identify Your Data . . . . . . 20
                     Ben Maurer   Fail at Scale  . . . . . . . . . . . . . 30
                Kate Matsudaira   Lean Software Development --- Building
                                  and Shipping Two Versions  . . . . . . . 40
           Thomas A. Limoncelli   Automation Should Be Like Iron Man, Not
                                  Ultron . . . . . . . . . . . . . . . . . 50
                  Taylor Savage   Componentizing the Web . . . . . . . . . 60
                Fabien Gaud and   
            Baptiste Lepers and   
             Justin Funston and   
            Mohammad Dashti and   
         Alexandra Fedorova and   
        Vivien Quéma and   
            Renaud Lachaize and   
                      Mark Roth   Challenges of Memory Management on
                                  Modern NUMA System . . . . . . . . . . . 70
            George Neville-Neil   Kode Vicious: Pickled Patches  . . . . . 90
                Amin Vahdat and   
                David Clark and   
               Jennifer Rexford   A Purpose-built Global Network: Google's
                                  Move to SDN  . . . . . . . . . . . . . . 100

ACM Queue: Tomorrow's Computing Today
Volume 13, Number 9, November / December, 2015

                 R. V. Guha and   
               Dan Brickley and   
                  Steve MacBeth   Schema.org: Evolution of Structured Data
                                  on the Web . . . . . . . . . . . . . . . 10
             Mihir Nanavati and   
          Malte Schwarzkopf and   
                 Jake Wires and   
                Andrew Warfield   Non-volatile Storage . . . . . . . . . . 20
            George Neville-Neil   Time is an Illusion  . . . . . . . . . . 30
                    Pat Helland   Immutability Changes Everything  . . . . 40
           Nicholas Diakopoulos   Accountability in Algorithmic
                                  Decision-making  . . . . . . . . . . . . 50
               Caitie McCaffrey   The Verification of a Distributed System 60
           Thomas A. Limoncelli   How Sysadmins Devalue Themselves . . . . 70
                Kate Matsudaira   The Paradox of Autonomy and Recognition  80
            George Neville-Neil   Code Hoarding  . . . . . . . . . . . . . 90


ACM Queue: Tomorrow's Computing Today
Volume 14, Number 1, January, 2016

              Brendan Burns and   
                Brian Grant and   
          David Oppenheimer and   
                Eric Brewer and   
                    John Wilkes   Borg, Omega, and Kubernetes  . . . . . . 10
              Heinrich Hartmann   Statistics for Engineers . . . . . . . . 20
              Poul-Henning Kamp   More Encryption Means Less Privacy . . . 30
            George Neville-Neil   GNL is Not Linux . . . . . . . . . . . . 40
              Ivar Jacobson and   
                 Ian Spence and   
                     Brian Kerr   Use-Case 2.0 . . . . . . . . . . . . . . 50
             Carlos Baquero and   
           Nuno Preguiça   Why Logical Clocks are Easy  . . . . . . 60
                Kate Matsudaira   Delegation as Art  . . . . . . . . . . . 70

ACM Queue: Tomorrow's Computing Today
Volume 14, Number 2, March, 2016

                  Brendan Gregg   The Flame Graph  . . . . . . . . . . . . 10
            George Neville-Neil   What Are You Trying to Pull? . . . . . . 20
                    Sachin Date   Should You Upload or Ship Big Data to
                                  the Cloud? . . . . . . . . . . . . . . . 30
                Kate Matsudaira   Nine Things I Didn't Know I Would Learn
                                  Being an Engineer Manager  . . . . . . . 40
          Ivan Beschastnikh and   
                 Patty Wang and   
                 Yuriy Brun and   
                 Michael D. and   
                          Ernst   Debugging Distributed Systems  . . . . . 50
           Thomas A. Limoncelli   The Small Batches Principle  . . . . . . 60
               Peter Bailis and   
             Justine Sherry and   
                    Simon Peter   Introducing Research for Practice  . . . 70
                    Pat Helland   Standing on Distributed Shoulders of
                                  Giants . . . . . . . . . . . . . . . . . 80

ACM Queue: Tomorrow's Computing Today
Volume 14, Number 3, May, 2016

                   Tom Killalea   The Hidden Dividends of Microservices    10
            George Neville-Neil   Chilling the Messenger . . . . . . . . . 20
                   Satnam Singh   Cluster-level Logging of Containers with
                                  Containers . . . . . . . . . . . . . . . 30
               Peter Bailis and   
           Camille Fournier and   
                Joy Arulraj and   
                     Andy Pavlo   Research for Practice: Distributed
                                  Consensus and Implications of NVM on
                                  Database Management Systems  . . . . . . 40
                 Andre Medeiros   Dynamics of Change: Why Reactivity
                                  Matters  . . . . . . . . . . . . . . . . 50
                Kate Matsudaira   Bad Software Architecture is a People
                                  Problem  . . . . . . . . . . . . . . . . 60
             Ulan Degenbaev and   
            Jochen Eisinger and   
              Manfred Ernst and   
               Ross McIlroy and   
                   Hannes Payer   Idle-Time Garbage-Collection Scheduling  70
                    Pat Helland   The Singular Success of SQL  . . . . . . 80

ACM Queue: Tomorrow's Computing Today
Volume 14, Number 4, July, 2016

           Thomas A. Limoncelli   10 Optimizations on Linear Search  . . . 10
                  Adam Morrison   Scaling Synchronization in Multicore
                                  Programs . . . . . . . . . . . . . . . . 20
            George Neville-Neil   Cloud Calipers . . . . . . . . . . . . . 30
                  Pete Hunt and   
           Paul O'Shannessy and   
                 Dave Smith and   
                   Terry Coatta   React: Facebook's Functional Turn on
                                  Writing JavaScript . . . . . . . . . . . 40
                Kate Matsudaira   Fresh Starts . . . . . . . . . . . . . . 50
                 Marius Eriksen   Functional at Scale  . . . . . . . . . . 60
                    Pat Helland   The Power of Babble  . . . . . . . . . . 70
                  Jean Yang and   
         Vijay Janapa Reddi and   
                  Yuhao Zhu and   
                   Peter Bailis   Research for Practice: Web Security and
                                  Mobile Web Computing . . . . . . . . . . 80

ACM Queue: Tomorrow's Computing Today
Volume 14, Number 5, September, 2016

              Ivar Jacobson and   
                 Ian Spence and   
                   Ed Seidewitz   Industrial Scale Agile --- from Craft to
                                  Engineering  . . . . . . . . . . . . . . 10
            George Neville-Neil   The Unholy Trinity of Software
                                  Development  . . . . . . . . . . . . . . 20
                Josh Bailey and   
                 Stephen Stuart   Faucet: Deploying SDN in the Enterprise  30
                Kate Matsudaira   Resolving Conflict . . . . . . . . . . . 40
              Neal Cardwell and   
              Yuchung Cheng and   
            C. Stephen Gunn and   
      Soheil Hassas Yeganeh and   
                   Van Jacobson   BBR: Congestion-Based Congestion Control 50
                Irene Zhang and   
                 Fadel Adib and   
                   Peter Bailis   Research for Practice: Distributed
                                  Transactions and Networks as Physical
                                  Sensors  . . . . . . . . . . . . . . . . 60
                    Pat Helland   Life Beyond Distributed Transactions . . 70

ACM Queue: Tomorrow's Computing Today
Volume 14, Number 6, November, 2016

           Thomas A. Limoncelli   Are You Load Balancing Wrong?  . . . . . 10
            George Neville-Neil   The Chess Player who Couldn't Pass the
                                  Salt . . . . . . . . . . . . . . . . . . 20
              Theo Schlossnagle   Time, but Faster . . . . . . . . . . . . 30
                 Mohamed Zahran   Heterogeneous Computing: Here to Stay    40
              Robert C. Seacord   Uninitialized Reads  . . . . . . . . . . 50
           Arvind Narayanan and   
              Andrew Miller and   
                   Song Han and   
                   Peter Bailis   Research for Practice: Cryptocurrencies,
                                  Blockchains, and Smart Contracts;
                                  Hardware for Deep Learning . . . . . . . 60
       Meng-Day (Mandel) Yu and   
               Srinivas Devadas   Pervasive, Dynamic Authentication of
                                  Physical Items . . . . . . . . . . . . . 70


ACM Queue: Tomorrow's Computing Today
Volume 15, Number 1, January, 2017

                    Erik Meijer   Making Money Using Math  . . . . . . . . 10
                Kate Matsudaira   Does Anybody Listen to You?  . . . . . . 20
                     Robert Guo   MongoDB's JavaScript Fuzzer  . . . . . . 30
            George Neville-Neil   Forced Exception-Handling  . . . . . . . 40
                Devon H. O'Dell   The Debugging Mindset  . . . . . . . . . 50
               Peter Alvaro and   
              Sumit Galwani and   
                   Peter Bailis   Research for Practice: Tracing and
                                  Debugging Distributed Systems;
                                  Programming by Examples  . . . . . . . . 60
                Pat Helland and   
               Simon Weaver and   
                      Ed Harris   Too Big NOT to Fail  . . . . . . . . . . 70

ACM Queue: Tomorrow's Computing Today
Volume 15, Number 2, March, 2017

            George Neville-Neil   The Observer Effect  . . . . . . . . . . 10
                Mark A. Overton   The IDAR Graph . . . . . . . . . . . . . 20
                Kate Matsudaira   Conversations with Technology Leaders:
                                  Erik Meijer  . . . . . . . . . . . . . . 30
     Benjamin Treynor Sloss and   
                Mike Dahlin and   
                  Vivek Rau and   
                    Betsy Beyer   The Calculus of Service Availability . . 40
                    Pat Helland   Side Effects, Front and Center!  . . . . 50
                 Graham Cormode   Data Sketching . . . . . . . . . . . . . 60
          Tawanna Dillahunt and   
           Stefanie Mueller and   
           Patrick Baudisch and   
                   Peter Bailis   Research for Practice: Technology for
                                  Underserved Communities; Personal
                                  Fabrication  . . . . . . . . . . . . . . 70

ACM Queue: Tomorrow's Computing Today
Volume 15, Number 3, May, 2017

            George Neville-Neil   IoT: The Internet of Terror  . . . . . . 10
              Ivar Jacobson and   
                 Ian Spence and   
                     Pan-Wei Ng   Is There a Single Method for the
                                  Internet of Things?  . . . . . . . . . . 20
                Kate Matsudaira   10 Ways to Be a Better Interviewer . . . 30
                  Alvaro Videla   Metaphors We Compute By  . . . . . . . . 40
           Thomas A. Limoncelli   Four Ways to Make CS&IT Curricula More
                                  Immersive  . . . . . . . . . . . . . . . 50
               Edward Steel and   
               Yanik Berube and   
         Jonas Bonér and   
                Ken Britton and   
                   Terry Coatta   Hootsuite: In Pursuit of Reactive
                                  Systems  . . . . . . . . . . . . . . . . 60
                John Regehr and   
                   Peter Bailis   Vigorous Public Debates in Academic
                                  Computer Science . . . . . . . . . . . . 70

ACM Queue: Tomorrow's Computing Today
Volume 15, Number 4, July, 2017

            George Neville-Neil   Cold, Hard Cache . . . . . . . . . . . . 10
           Arvind Narayanan and   
                   Jeremy Clark   Bitcoin's Academic Pedigree  . . . . . . 20
                 Jacob Loveless   Cache Me If You Can  . . . . . . . . . . 30
                Kate Matsudaira   Breadth and Depth  . . . . . . . . . . . 40
                    Pat Helland   XML and JSON Are Like Cardboard  . . . . 50
                Antony Alappatt   Network Applications Are Interactive . . 60
                Albert Kwon and   
                   James Wilcox   Private Online Communication; Highlights
                                  in Systems Verification  . . . . . . . . 70

ACM Queue: Tomorrow's Computing Today
Volume 15, Number 5, September / October, 2017

               Peter Alvaro and   
                 Severine Tymon   Abstracting the Geniuses Away from
                                  Failure Testing  . . . . . . . . . . . . 10
                Kate Matsudaira   Views from the Top . . . . . . . . . . . 20
               Andrew Leung and   
              Andrew Spyker and   
                    Tim Bozarth   Titus: Introducing Containers to the
                                  Netflix Cloud  . . . . . . . . . . . . . 30
            George Neville-Neil   Reducing the Attack Surface  . . . . . . 40
        Yonatan Sompolinsky and   
                     Aviv Zohar   Bitcoin's Underlying Incentives  . . . . 50:29--50:52
           Thomas A. Limoncelli   Operational Excellence in April Fools'
                                  Pranks . . . . . . . . . . . . . . . . . 60
              Malte Schwarzkopf   Cluster Scheduling for Data Centers  . . 70

ACM Queue: Tomorrow's Computing Today
Volume 15, Number 6, November, 2017

              Theo Schlossnagle   Monitoring in a DevOps World . . . . . . 10
            George Neville-Neil   Popping Kernels  . . . . . . . . . . . . 20
            Nicole Forsgren and   
                    Mik Kersten   DevOps Metrics . . . . . . . . . . . . . 30
                Kate Matsudaira   How Is Your Week Going So Far? . . . . . 40
               Bridget Kromhout   Containers Will Not Fix Your Broken
                                  Culture (and Other Hard Truths)  . . . . 50
                 Deepak Vasisht   Toward a Network of Connected Things . . 60
                     Jez Humble   Continuous Delivery Sounds Great, but
                                  Will It Work Here? . . . . . . . . . . . 70


ACM Queue: Tomorrow's Computing Today
Volume 16, Number 1, January, 2018

\vSt\vepán Davidovi\vc and   
                    Betsy Beyer   Canary Analysis Service  . . . . . . . . 10
           Thomas A. Limoncelli   Manual Work is a Bug . . . . . . . . . . 20
      Diptanu Gon Choudhury and   
                Timothy Perrett   Designing Cluster Schedulers for
                                  Internet-Scale Services  . . . . . . . . 30
                Kate Matsudaira   How to Come up with Great Ideas  . . . . 40
            Tobias Lauinger and   
         Abdelberi Chaabane and   
                 Christo Wilson   Thou Shalt Not Depend on Me  . . . . . . 50
            George Neville-Neil   Watchdogs vs. Snowflakes . . . . . . . . 60
              Dan Crankshaw and   
                Joseph Gonzalez   Prediction-Serving Systems . . . . . . . 70

ACM Queue: Tomorrow's Computing Today
Volume 16, Number 2, March, 2018

                 David Chisnall   C Is Not a Low-level Language  . . . . . 10
            George Neville-Neil   Every Silver Lining Has a Cloud  . . . . 20
                    Alex Petrov   Algorithms Behind Modern Storage Systems 30
                    Pat Helland   Consistently Eventual  . . . . . . . . . 40
                    Noor Mubeen   Workload Frequency Scaling Law ---
                                  Derivation and Verification  . . . . . . 50
                 Gustavo Alonso   FPGAs in Data Centers  . . . . . . . . . 60

ACM Queue: Tomorrow's Computing Today
Volume 16, Number 3, May, 2018

                    Pat Helland   Mind Your State for Your State of Mind   10
           Thomas A. Limoncelli   GitOps: a Path to More Self-service IT   20
              Zachary C. Lipton   The Mythos of Model Interpretability . . 30
                Kate Matsudaira   The Secret Formula for Choosing the
                                  Right Next Role  . . . . . . . . . . . . 40
                Alex Ratner and   
          Christopher Ré   Knowledge Base Construction in the
                                  Machine-learning Era . . . . . . . . . . 50
                  Matt Fata and   
      Philippe-Joseph Arida and   
               Patrick Hahn and   
                    Betsy Beyer   Corp to Cloud: Google's Virtual Desktops 60
            George Neville-Neil   The Obscene Coupling Known as Spaghetti
                                  Code . . . . . . . . . . . . . . . . . . 70

ACM Queue: Tomorrow's Computing Today
Volume 16, Number 4, July, 2018

       Silvia Esparrachiari and   
               Tanya Reilly and   
                 Ashleigh Rentz   Tracking and Controlling Microservice
                                  Dependencies . . . . . . . . . . . . . . 10
                Kate Matsudaira   How to Get Things Done When You Don't
                                  Feel Like It . . . . . . . . . . . . . . 20
               Rich Bennett and   
             Craig Callahan and   
                Stacy Jones and   
                Matt Levine and   
             Merrill Miller and   
                    Andy Ozment   How to Live in a Post-Meltdown and
                                  -Spectre World . . . . . . . . . . . . . 30
             Shylaja Nukala and   
                      Vivek Rau   Why SRE Documents Matter . . . . . . . . 40
            George Neville-Neil   A Chance Gardener  . . . . . . . . . . . 50
                      Alpha Lam   Using Remote Cache Service for Bazel . . 60

ACM Queue: Tomorrow's Computing Today
Volume 16, Number 5, September, 2018

               Richard L. Sites   Benchmarking ``Hello, World!'' . . . . . 10
            Jacek Czerwonka and   
           Michaela Greiler and   
             Christian Bird and   
               Lucas Panjer and   
                   Terry Coatta   CodeFlow: Improving the Code Review
                                  Process at Microsoft . . . . . . . . . . 20
                Kate Matsudaira   The Importance of a Great Finish . . . . 30
            George Neville-Neil   Writing a Test Plan  . . . . . . . . . . 40
           Simson Garfinkel and   
              John M. Abowd and   
           Christian Martindale   Understanding Database Reconstruction
                                  Attacks on Public Data . . . . . . . . . 50
           Thomas A. Limoncelli   SQL is No Excuse to Avoid DevOps . . . . 60
                Jessie Frazelle   Security for the Modern Age  . . . . . . 70
              Ivar Jacobson and   
                   Roly Stimson   Tear Down the Method Prisons! Set Free
                                  the Practices! . . . . . . . . . . . . . 80

ACM Queue: Tomorrow's Computing Today
Volume 16, Number 6, November, 2018

                      Jim Waldo   A Hitchhiker's Guide to the Blockchain
                                  Universe . . . . . . . . . . . . . . . . 10
                Kate Matsudaira   Design Patterns for Managing Up  . . . . 20
     Benjamin Treynor Sloss and   
             Shylaja Nukala and   
                      Vivek Rau   Metrics That Matter  . . . . . . . . . . 30
            George Neville-Neil   Know Your Algorithms . . . . . . . . . . 40
               Raymond Blum and   
                    Betsy Beyer   Achieving Digital Permanence . . . . . . 50
                     Nitesh Mor   Edge Computing . . . . . . . . . . . . . 60
                    Pat Helland   Identity by Any Other Name . . . . . . . 70


ACM Queue: Tomorrow's Computing Today
Volume 17, Number 1, January, 2019

                  Adrian Colyer   SageDB and NetAccel  . . . . . . . . . . 10
          Aleksander Kuzmanovic   Net Neutrality: Unexpected Solution to
                                  Blockchain Scaling . . . . . . . . . . . 20
            George Neville-Neil   The Worst Idea of All Time . . . . . . . 30
           Martin Kleppmann and   
      Alastair R. Beresford and   
                 Boerge Svingen   Online Event Processing  . . . . . . . . 40
                Kate Matsudaira   How to Create a Great Team Culture (and
                                  Why It Matters)  . . . . . . . . . . . . 50
             Ulan Degenbaev and   
           Michael Lippautz and   
                   Hannes Payer   Garbage Collection as a Joint Venture    60
           Thomas A. Limoncelli   Tom's Top Ten Things Executives Should
                                  Know About Software  . . . . . . . . . . 70
          Zachary C. Lipton and   
               Jacob Steinhardt   Troubling Trends in Machine Learning
                                  Scholarship  . . . . . . . . . . . . . . 80

ACM Queue: Tomorrow's Computing Today
Volume 17, Number 2, March, 2019

                  Adrian Colyer   GAN Dissection and Datacenter RPCs . . . 10
                Natasha Noy and   
                 Yuqing Gao and   
                 Anshu Jain and   
            Anant Narayanan and   
             Alan Patterson and   
                   Jamie Taylor   Industry-scale Knowledge Graphs: Lessons
                                  and Challenges . . . . . . . . . . . . . 20
                Kate Matsudaira   Overly Attached  . . . . . . . . . . . . 30
             Anna Wiedemann and   
            Nicole Forsgren and   
             Manuel Wiesche and   
               Heiko Gewald and   
                  Helmut Krcmar   The DevOps Phenomenon  . . . . . . . . . 40
                David Evans and   
           Richard McDonald and   
                   Terry Coatta   Access Controls and Health Care Records:
                                  Who Owns the Data? . . . . . . . . . . . 50
                    Pat Helland   Extract, Shoehorn, and Load  . . . . . . 60
            George Neville-Neil   MUST and MUST NOT  . . . . . . . . . . . 70
                       Russ Cox   Surviving Software Dependencies  . . . . 80

ACM Queue: Tomorrow's Computing Today
Volume 17, Number 3, May, 2019

                  Adrian Colyer   Time Protection in Operating Systems and
                                  Speaker Legitimacy Detection . . . . . . 10
                Jessie Frazelle   Open-source Firmware . . . . . . . . . . 20
                Kate Matsudaira   The Evolution of Management  . . . . . . 30
                   Tom Killalea   Velocity in Software Engineering . . . . 40
           Thomas A. Limoncelli   Demo Data as Code  . . . . . . . . . . . 50
            George Neville-Neil   What is a CSO Good For?  . . . . . . . . 60
                 Shaul Kfir and   
               Camille Fournier   DAML: The Contract Language of
                                  Distributed Ledgers  . . . . . . . . . . 70

ACM Queue: Tomorrow's Computing Today
Volume 17, Number 4, July, 2019

                  Terence Kelly   Persistent Memory Programming on
                                  Conventional Hardware  . . . . . . . . . 10
            George Neville-Neil   Koding Academies . . . . . . . . . . . . 20
           Michelle Vaccaro and   
                      Jim Waldo   The Effects of Mixing Machine Learning
                                  and Human Judgment . . . . . . . . . . . 30
                    Pat Helland   Write Amplification Versus Read
                                  Perspiration . . . . . . . . . . . . . . 40
                  Ariana Mirian   Hack for Hire  . . . . . . . . . . . . . 50
                  Adrian Colyer   Putting Machine Learning into Production
                                  Systems  . . . . . . . . . . . . . . . . 60

ACM Queue: Tomorrow's Computing Today
Volume 17, Number 5, September, 2019

                  Adrian Colyer   Back under a SQL Umbrella  . . . . . . . 10
                   Matt Godbolt   Optimizations in C++ Compilers . . . . . 20
                    Pat Helland   Space Time Discontinuum  . . . . . . . . 30
                     Sanjay Sha   The Reliability of Enterprise
                                  Applications . . . . . . . . . . . . . . 40
           Thomas A. Limoncelli   API Practices If You Hate Your Customers 50
                Jessie Frazelle   Opening up the Baseboard Management
                                  Controller . . . . . . . . . . . . . . . ??
         George V. Neville-Neil   Numbers Are for Computers, Strings Are
                                  for Humans . . . . . . . . . . . . . . . ??

ACM Queue: Tomorrow's Computing Today
Volume 17, Number 6, November / December, 2019

             David D. Woods and   
                   John Allspaw   Revealing the Critical Role of Human
                                  Performance in Software  . . . . . . . . ??
                Richard I. Cook   Above the Line, Below the Line . . . . . ??
              Marisa R. Grayson   Cognitive Work of Hypothesis Exploration
                                  During Anomaly Response  . . . . . . . . ??
            Laura M. D. Maguire   Managing the Hidden Costs of
                                  Coordination . . . . . . . . . . . . . . ??
                   J. Paul Reed   Beyond the Fix-it Treadmill  . . . . . . ??
                Jessie Frazelle   Securing the Boot Process  . . . . . . . ??
         George V. Neville-Neil   Master of Tickets  . . . . . . . . . . . ??


ACM Queue: Tomorrow's Computing Today
Volume 18, Number 1, January, 2020

                      Anonymous   Demystifying Stablecoins . . . . . . . . ??
                Jessie Frazelle   Chipping Away at Moore's Law . . . . . . ??
           Thomas A. Limoncelli   Communicate Using the Numbers 1, 2, 3,
                                  and More . . . . . . . . . . . . . . . . ??

ACM Queue: Tomorrow's Computing Today
Volume 18, Number 2, March, 2020

              Charisma Chan and   
                    Beth Cooper   Debugging Incidents in Google's
                                  Distributed Systems  . . . . . . . . . . ??
                Jessie Frazelle   Power to the People  . . . . . . . . . . ??
                  Terence Kelly   Is Persistent Memory Persistent? . . . . ??
           Arvind Narayanan and   
             Arunesh Mathur and   
            Marshini Chetty and   
               Mihir Kshirsagar   Dark Patterns: Past, Present, and Future ??
            George Neville-Neil   Broken Hearts and Coffee Mugs  . . . . . ??

ACM Queue: Tomorrow's Computing Today
Volume 18, Number 3, June, 2020

                Jessie Frazelle   The Life of a Data Byte: Be kind and
                                  rewind . . . . . . . . . . . . . . . . . 5--28
           Thomas A. Limoncelli   Five Nonobvious Remote Work Techniques:
                                  Emulating the efficiency of in-person
                                  conversations  . . . . . . . . . . . . . 29--38
            George Neville-Neil   Sanity vs. Invisible Markings: Tabs vs.
                                  spaces . . . . . . . . . . . . . . . . . 39--42
                    Pat Helland   Data on the Outside vs. Data on the
                                  Inside: Data kept outside SQL has
                                  different characteristics from data kept
                                  inside . . . . . . . . . . . . . . . . . 43--60
               Oskar Mencer and   
             Dennis Allison and   
                 Elad Blatt and   
              Mark Cummings and   
           Michael J. Flynn and   
               Jerry Harris and   
                Carl Hewitt and   
             Quinn Jacobson and   
            Maysam Lavasani and   
             Mohsen Moazami and   
                 Hal Murray and   
           Masoud Nikravesh and   
           Andreas Nowatzyk and   
                 Mark Shand and   
                Shahram Shirazi   The History, Status, and Future of
                                  FPGAs: Hitting a nerve with
                                  field-programmable gate arrays . . . . . 71--82
            Jeff Sutherland and   
              Ivar Jacobson and   
                     Brian Kerr   Scrum Essentials Cards: Experiences of
                                  Scrum Teams Improving with Essence . . . 83--106

ACM Queue: Tomorrow's Computing Today
Volume 18, Number 4, August, 2020

                Jessie Frazelle   Out-of-this-World Additive
                                  Manufacturing: From thingamabobs to
                                  rockets, $3$D printing takes many forms  5--20
         George V. Neville-Neil   Removing Kode: Dead functions and dead
                                  features . . . . . . . . . . . . . . . . 21--25
                  Terence Kelly   Efficient Graph Search . . . . . . . . . 25--36
           Roger Piqueras Jover   Security Analysis of SMS as a Second
                                  Factor of Authentication: The challenges
                                  of multifactor authentication based on
                                  SMS, including cellular security
                                  deficiencies, SS7 exploits, and SIM
                                  swapping . . . . . . . . . . . . . . . . 37--60
                    Phil Vachon   The Identity in Everyone's Pocket:
                                  Keeping users secure through their
                                  smartphones  . . . . . . . . . . . . . . 61--94
                Edlyn V. Levine   The Die is Cast: Hardware Security is
                                  Not Assured  . . . . . . . . . . . . . . 95--109

ACM Queue: Tomorrow's Computing Today
Volume 18, Number 5, October, 2020

                Jessie Frazelle   Battery Day: a closer look at the
                                  technology that makes portable
                                  electronics possible . . . . . . . . . . 5--25
           Thomas A. Limoncelli   The Time I Stole \$10,000 from {Bell
                                  Labs}: Or why {DevOps} encourages us to
                                  celebrate outages  . . . . . . . . . . . 26--35
         George V. Neville-Neil   Kabin Fever: KV's guidelines for KFH
                                  (koding from home) . . . . . . . . . . . 35--40
                  Terence Kelly   Decentralized Computing  . . . . . . . . 41--53
                 David Crawshaw   Everything VPN is New Again: The
                                  24-year-old security model has found a
                                  second wind  . . . . . . . . . . . . . . 54--66
                   Tom Killalea   A Second Conversation with Werner
                                  Vogels: The Amazon CTO sits with Tom
                                  Killalea to discuss designing for
                                  evolution at scale . . . . . . . . . . . 67--92
             Miguel Guevara and   
        Damien Desfontaines and   
                  Jim Waldo and   
                   Terry Coatta   Differential Privacy: The Pursuit of
                                  Protections by Default: a discussion
                                  with Miguel Guevara, Damien
                                  Desfontaines, Jim Waldo, and Terry
                                  Coatta . . . . . . . . . . . . . . . . . 93--112

ACM Queue: Tomorrow's Computing Today
Volume 18, Number 6, December, 2020

                Jessie Frazelle   Let's Play Global Thermonuclear Energy:
                                  It's important to know where your power
                                  comes from . . . . . . . . . . . . . . . 5--20
                    Pat Helland   Baleen Analytics: Large-scale filtering
                                  of data provides serendipitous surprises 21--30
         George V. Neville-Neil   The Non-psychopath's Guide to Managing
                                  an Open-source Project: Respect your
                                  staff, learn from others, and know when
                                  to let go  . . . . . . . . . . . . . . . 30--36
                  Terence Kelly   Offline Algorithms in Low-Frequency
                                  Trading: Clearing Combinatorial Auctions 37--51
            Chris Nokleberg and   
                    Brad Hawkes   Best Practice: Application Frameworks:
                                  While powerful, frameworks are not for
                                  everyone . . . . . . . . . . . . . . . . 52--77
             Jatinder Singh and   
             Jennifer Cobbe and   
                 Do Le Quoc and   
                 Zahra Tarkhani   Enclaves in the Clouds: Legal
                                  considerations and broader implications  78--114
                      Anonymous   Always-on Time-series Database: Keeping
                                  Up Where There's No Way to Catch Up: a
                                  discussion with Theo Schlossnagle,
                                  Justin Sheehy, and Chris McCubbin  . . . 115--135


ACM Queue: Tomorrow's Computing Today
Volume 19, Number 1, February, 2021

                    Pat Helland   Fail-fast Is Failing\ldots Fast!:
                                  Changes in compute environments are
                                  placing pressure on tried-and-true
                                  distributed-systems solutions. . . . . . 5--15
         George V. Neville-Neil   Aversion to Versions: Resolving
                                  code-dependency issues . . . . . . . . . 16--19
            Nicole Forsgren and   
       Margaret-Anne Storey and   
            Chandra Maddila and   
          Thomas Zimmermann and   
                Brian Houck and   
                   Jenna Butler   The SPACE of Developer Productivity:
                                  There's more to it than you think. . . . 20--48
           Mark Russinovich and   
               Manuel Costa and   
      Cédric Fournet and   
             David Chisnall and   
    Antoine Delignat-Lavaud and   
             Sylvan Clebsch and   
              Kapil Vaswani and   
                   Vikas Bhatia   Toward Confidential Cloud Computing:
                                  Extending hardware-enforced
                                  cryptographic protection to data while
                                  in use . . . . . . . . . . . . . . . . . 49--76
                Niklas Blum and   
           Serge Lachapelle and   
              Harald Alvestrand   WebRTC --- Realtime Communication for
                                  the Open Web Platform: What was once a
                                  way to bring audio and video to the web
                                  has expanded into more use cases we
                                  could ever imagine.  . . . . . . . . . . 77--93
     João Varajão   Software Development in Disruptive
                                  Times: Creating a software solution with
                                  fast decision capability, agile project
                                  management, and extreme low-code
                                  technology . . . . . . . . . . . . . . . 94--103

ACM Queue: Tomorrow's Computing Today
Volume 19, Number 2, April, 2021

                Jessie Frazelle   A New Era for Mechanical CAD: Time to
                                  move forward from decades-old design . . 5--16
                    Pat Helland   ACID: My Personal ``C`` Change: How
                                  could I miss such a simple thing?  . . . 17--20
         George V. Neville-Neil   In Praise of the Disassembler: There's
                                  much to be learned from the lower-level
                                  details of hardware  . . . . . . . . . . 21--28
              Terence Kelly and   
                  Weiwei Gu and   
           Vladimir Maksimovski   Schrödinger's Code: Undefined behavior in
                                  theory and practice  . . . . . . . . . . 28--44
           Ramya Srinivasan and   
                   Ajay Chander   Biases in AI Systems: a survey for
                                  practitioners  . . . . . . . . . . . . . 45--64
            Atefeh Mashatan and   
              Douglas Heintzman   The Complex Path to Quantum Resistance:
                                  Is your organization prepared? . . . . . 65--92
           Michael Gardiner and   
       Alexander Truskovsky and   
        George Neville-Neil and   
                Atefeh Mashatan   Quantum-safe Trust for Vehicles: The
                                  race is already on . . . . . . . . . . . 93--115

ACM Queue: Tomorrow's Computing Today
Volume 19, Number 3, June, 2021

                   Liu Leqi and   
      Dylan Hadfield-Menell and   
              Zachary C. Lipton   When Curation Becomes Creation:
                                  Algorithms, microcontent, and the
                                  vanishing distinction between platforms
                                  and creators . . . . . . . . . . . . . . 11--15
                    Pat Helland   Don't Get Stuck in the ``Con'' Game:
                                  Consistency, convergence, and confluence
                                  are not the same! Eventual consistency
                                  and eventual convergence aren't the same
                                  as confluence, either  . . . . . . . . . 16--35
         George V. Neville-Neil   Divide and Conquer: The use and limits
                                  of bisection . . . . . . . . . . . . . . 37--39
              Poul-Henning Kamp   What Went Wrong?: Why we need an IT
                                  accident investigation board . . . . . . 40--44
               Piero Molino and   
          Christopher Ré   Declarative Machine Learning Systems:
                                  The future of machine learning will
                                  depend on it being in the hands of the
                                  rest of us . . . . . . . . . . . . . . . 46--76
              Ashish Gehani and   
                 Raza Ahmad and   
              Hassan Irshad and   
               Jianqiao Zhu and   
                  Jignesh Patel   Digging into Big Provenance (with
                                  SPADE): a user interface for querying
                                  provenance . . . . . . . . . . . . . . . 77--106
                Torsten Ullrich   Real-world String Comparison: How to
                                  handle Unicode sequences correctly . . . 107--116

ACM Queue: Tomorrow's Computing Today
Volume 19, Number 4, July, 2021

                  Terence Kelly   Crashproofing the Original NoSQL
                                  Key--Value Store: an upgrade for the \tt
                                  gdbm database  . . . . . . . . . . . . . 5--18
                      Anonymous   Patent Absurdity: a case when ignorance
                                  is the best policy . . . . . . . . . . . 19--22
              Poul-Henning Kamp   The Software Industry IS STILL the
                                  Problem: The time is (also) way overdue
                                  for IT professional liability  . . . . . 23--28
                Patrick Thomson   Static Analysis: an Introduction: The
                                  fundamental challenge of software
                                  engineering is one of complexity . . . . 29--41
               Timothy Clem and   
                Patrick Thomson   Static Analysis at GitHub: an experience
                                  report . . . . . . . . . . . . . . . . . 42--67
                   Ayman Nadeem   Human-Centered Approach to
                                  Static-Analysis-Driven Developer Tools:
                                  The future depends on good HCI . . . . . 68--95
             Daniil Tiganov and   
       Lisa Nguyen Quang Do and   
                      Karim Ali   Designing UIs for Static Analysis Tools:
                                  Evaluating tool design guidelines with
                                  SWAN . . . . . . . . . . . . . . . . . . 97--118

ACM Queue: Tomorrow's Computing Today
Volume 19, Number 5, September, 2021

                Jessie Frazelle   Chip Measuring Contest: The benefits of
                                  purpose-built chips  . . . . . . . . . . 5--21
         George V. Neville-Neil   I Unplugged What?: The lessons here are
                                  broader than just a simple ``Don't do
                                  that.''  . . . . . . . . . . . . . . . . 22--25
           Kelly Shortridge and   
                   Ryan Petrich   Lamboozling Attackers: a New Generation
                                  of Deception: Software engineering teams
                                  can exploit attackers' human nature by
                                  building deception environments. . . . . 26--59
                  Alvaro Videla   Meaning and Context in Computer
                                  Programs: Sharing domain knowledge among
                                  programmers using the source code as the
                                  medium . . . . . . . . . . . . . . . . . 60--68
              Margo Seltzer and   
                 Mike Olson and   
                  Kirk McCusick   A Conversation with Margo Seltzer and
                                  Mike Olson: The history of Berkeley DB   69--86
          Kallista Bonawitz and   
              Peter Kairouz and   
            Brendan McMahan and   
                  Daniel Ramage   Federated Learning and Privacy: Building
                                  privacy-preserving systems for machine
                                  learning and data science on
                                  decentralized data . . . . . . . . . . . 87--114
                Reynold Xin and   
               Wes McKinney and   
                 Alan Gates and   
                 Chris McCubbin   It Takes a Community: The Open-source
                                  Challenge  . . . . . . . . . . . . . . . 115--136

ACM Queue: Tomorrow's Computing Today
Volume 19, Number 6, November, 2021

                  Terence Kelly   Steampunk Machine Learning: Victorian
                                  contrivances for modern data science . . 5--17
         George V. Neville-Neil   Getting Off the Mad Path: Debuggers and
                                  assertions . . . . . . . . . . . . . . . 18--21
              Poul-Henning Kamp   Surveillance Too Cheap to Meter:
                                  Stopping Big Brother would require an
                                  expensive overhaul of the entire system. 22--27
               Valerie Chen and   
                 Jeffrey Li and   
               Joon Sik Kim and   
              Gregory Plumb and   
                Ameet Talwalkar   Interpretable Machine Learning: Moving
                                  from mythos to diagnostics . . . . . . . 28--56
                    Phil Vachon   The Keys to the Kingdom: a deleted
                                  private key, a looming deadline, and a
                                  last chance to patch a new static root
                                  of trust into the bootloader . . . . . . 57--65
               Michael Mattioli   FPGAs in Client Compute Hardware:
                                  Despite certain challenges, FPGAs
                                  provide security and performance
                                  benefits over ASICs  . . . . . . . . . . 66--88


ACM Queue: Tomorrow's Computing Today
Volume 20, Number 1, January, 2022

         George V. Neville-Neil   The Planning and Care of Data:
                                  Rearranging buckets for no good reason   4--9
           Alexandros Gazis and   
             Eleftheria Katsiri   Middleware 101: What to know now and for
                                  the future . . . . . . . . . . . . . . . 10--23
                Archie L. Cobbs   Persistence Programming: Are we doing
                                  this right?  . . . . . . . . . . . . . . 24--39
                Brian Eaton and   
               Jeff Stewart and   
                Jon Tedesco and   
                   N. Cihan Tas   Distributed Latency Profiling through
                                  Critical Path Tracing: CPT can provide
                                  actionable and precise latency analysis. 40--79
                    Pat Helland   Autonomous Computing: We frequently
                                  compute across autonomous boundaries but
                                  the implications of the patterns to
                                  ensure independence are rarely
                                  discussed. . . . . . . . . . . . . . . . 80--104

ACM Queue: Tomorrow's Computing Today
Volume 20, Number 2, March, 2022

              Poul-Henning Kamp   Linear Address Spaces: Unsafe at any
                                  speed  . . . . . . . . . . . . . . . . . 5--10
         George V. Neville-Neil   When Should a Black Box Be Transparent?:
                                  When is a replacement not a replacement? 11--15
                  Terence Kelly   Persistent Memory Allocation: Leverage
                                  to move a world of software  . . . . . . 16--30
              Benoit Baudry and   
                  Tim Toady and   
               Martin Monperrus   Long Live Software Easter Eggs!: They
                                  are as old as software . . . . . . . . . 31--42
               Jenna Butler and   
                  Catherine Yeh   Walk a Mile in Their Shoes: The Covid
                                  pandemic through the lens of four tech
                                  workers  . . . . . . . . . . . . . . . . 43--66
                James Agnew and   
                Pat Helland and   
                      Adam Cole   FHIR: Reducing Friction in the Exchange
                                  of Healthcare Data: a discussion with
                                  James Agnew, Pat Helland, and Adam Cole  67--88

ACM Queue: Tomorrow's Computing Today
Volume 20, Number 3, May, 2022

                    Pat Helland   I'm Probably Less Deterministic Than I
                                  Used to Be: Embracing randomness is
                                  necessary in cloud environments. . . . . 5--13
         George V. Neville-Neil   Securing the Company Jewels: GitHub and
                                  runbook security . . . . . . . . . . . . 14--17
            James P. Hughes and   
               Whitfield Diffie   The Challenges of IoT, TLS, and Random
                                  Number Generators in the Real World: Bad
                                  random numbers are still with us and are
                                  proliferating in modern systems  . . . . 18--40
              Sutapa Mondal and   
         Mangesh S. Gharote and   
                Sachin P. Lodha   Privacy of Personal Information: Going
                                  incog in a goldfish bowl . . . . . . . . 41--87
           Martin Kleppmann and   
                   Peter Alvaro   Convergence: Research for Practice
                                  reboot . . . . . . . . . . . . . . . . . 88--95

ACM Queue: Tomorrow's Computing Today
Volume 20, Number 4, July, 2022

              Poul-Henning Kamp   CSRB's Opus One: Comments on the Cyber
                                  Safety Review Board Log4j Event Report   5--10
         George V. Neville-Neil   The Four Horsemen of an Ailing Software
                                  Project: Don't let the pale rider catch
                                  you with an exception  . . . . . . . . . 11--15
               Raphael Auer and   
     Rainer BÃ\P hme and   
               Jeremy Clark and   
                  Didem Demirag   Mapping the Privacy Landscape for
                                  Central Bank Digital Currencies: Now is
                                  the time to shape what future payment
                                  flows will reveal about you  . . . . . . 16--38
                  Mache Creeger   The Rise of Fully Homomorphic
                                  Encryption: Often called the Holy Grail
                                  of cryptography, commercial FHE is near  39--60
             Michael Loftus and   
              Andrew Vezina and   
                 Rick Doten and   
                Atefeh Mashatan   The Arrival of Zero Trust: What Does it
                                  Mean?  . . . . . . . . . . . . . . . . . 61--79
               Matthew Bush and   
                Atefeh Mashatan   From Zero to One Hundred: Demystifying
                                  zero trust and its implications on
                                  enterprise people, process, and
                                  technology . . . . . . . . . . . . . . . 80--106
              Ram Alagappan and   
                   Peter Alvaro   Crash Consistency: Keeping data safe in
                                  the presence of crashes is a fundamental
                                  problem  . . . . . . . . . . . . . . . . 107--115

ACM Queue: Tomorrow's Computing Today
Volume 20, Number 5, September, 2022

           Thomas A. Limoncelli   Split Your Overwhelmed Teams: Two Teams
                                  of Five is Not the Same as One Team of
                                  Ten  . . . . . . . . . . . . . . . . . . 5--13
         George V. Neville-Neil   The Elephant in the Room: It's time to
                                  get the POSIX elephant off our necks . . 14--19
                  Terence Kelly   Literate Executables . . . . . . . . . . 20--32
                 Peter Ward and   
              Paul Wankadia and   
                 Kavita Guliani   Reinventing Backend Subsetting at
                                  Google: Designing an algorithm with
                                  reduced connection churn that could
                                  replace deterministic subsetting . . . . 33--57
             Jorge A. Navas and   
                  Ashish Gehani   OCCAM-v2: Combining Static and Dynamic
                                  Analysis for Effective and Efficient
                                  Whole-program Specialization: Leveraging
                                  scalable pointer analysis, value
                                  analysis, and dynamic analysis . . . . . 58--85
           Maya Kaczorowski and   
               Falcon Momot and   
     George V. Neville-Neil and   
                 Chris McCubbin   OSS Supply-chain Security: What Will It
                                  Take?  . . . . . . . . . . . . . . . . . 86--102

ACM Queue: Tomorrow's Computing Today
Volume 20, Number 6, 2022

         George V. Neville-Neil   All Sliders to the Right: Hardware
                                  Overkill . . . . . . . . . . . . . . . . 4--8
             Gabriel Falcao and   
JoÃ\pounds o Dinis Ferreira   To PiM or Not to PiM: The case for
                                  in-memory inferencing of quantized CNNs
                                  at the edge  . . . . . . . . . . . . . . 9--34
             Christian Bird and   
                 Denae Ford and   
          Thomas Zimmermann and   
            Nicole Forsgren and   
        Eirini Kalliamvakou and   
          Travis Lowdermilk and   
                     Idan Gazit   Taking Flight with Copilot: Early
                                  insights and opportunities of AI-powered
                                  pair-programming tools . . . . . . . . . 35--57
           Guenever Aldrich and   
                Danny Tsang and   
                 Jason McKenney   Three-part Harmony for Program Managers
                                  Who Just Don't Get It, Yet: Open-source
                                  software, open standards, and agile
                                  software development . . . . . . . . . . 58--79
                Stefan Nagy and   
                   Peter Alvaro   The Fun in Fuzzing: The debugging
                                  technique comes into its own . . . . . . 80--87


ACM Queue: Tomorrow's Computing Today
Volume 21, Number 1, January, 2023

         George V. Neville-Neil   The Parchment Path?: Is there ever a
                                  time when learning is not of value ---
                                  for its own sake?  . . . . . . . . . . . 5--11
              Terence Kelly and   
                      Yekai Pan   Catch-23: The New C Standard Sets the
                                  World on Fire  . . . . . . . . . . . . . 12--30
           Simson Garfinkel and   
                    Jon Stewart   Sharpening Your Tools: Updating
                                  bulk\_extractor for the 2020s  . . . . . 30--56
           Kelly Shortridge and   
                 Josiah Dykstra   Opportunity Cost and Missed Chances in
                                  Optimizing Cybersecurity: The loss of
                                  potential gain from other alternatives
                                  when one alternative is chosen . . . . . 30--56
                Zachary Tellman   Designing a Framework for Conversational
                                  Interfaces: Combining the latest
                                  advances in machine learning with
                                  earlier approaches . . . . . . . . . . . 85--101
             Alfred Spector and   
               Peter Norvig and   
              Chris Wiggins and   
             Jeannette Wing and   
                  Ben Fried and   
                Michael Tingley   More Than Just Algorithms: a discussion
                                  with Alfred Spector, Peter Norvig, Chris
                                  Wiggins, Jeannette Wing, Ben Fried, and
                                  Michael Tingley  . . . . . . . . . . . . 102--129

ACM Queue: Tomorrow's Computing Today
Volume 21, Number 2, March, 2023

         George V. Neville-Neil   The Human Touch: There is no substitute
                                  for good, direct, honest training  . . . 9--13
           Thomas A. Limoncelli   Improvement on End-to-End Encryption May
                                  Lead to Silent Revolution: Researchers
                                  are on a brink of what could be the next
                                  big improvement in communication privacy 10--13
              Amanda Casari and   
            Julia Ferraioli and   
                 Juniper Lovato   Beyond the Repository: Best practices
                                  for open source ecosystems researchers   14--34
                   Abi Noda and   
       Margaret-Anne Storey and   
            Nicole Forsgren and   
               Michaela Greiler   DevEx: What Actually Drives
                                  Productivity: The developer-centric
                                  approach to measuring and improving
                                  productivity . . . . . . . . . . . . . . 35--53
            David Collier-Brown   You Don't know Jack about Application
                                  Performance: Knowing whether you're
                                  doomed to fail is important when
                                  starting a project . . . . . . . . . . . 54--65
                Edlyn V. Levine   Cargo Cult AI: Is the ability to think
                                  scientifically the defining essence of
                                  intelligence?  . . . . . . . . . . . . . 66--87
              Kostis Kaffes and   
                   Peter Alvaro   OS Scheduling: Better scheduling
                                  policies for modern computing systems    88--95

ACM Queue: Tomorrow's Computing Today
Volume 21, Number 3, May, 2023

                Kate Matsudaira   Managing Hybrid Teams: The combination
                                  of on-site and remote workers takes
                                  extra effort from team leaders.  . . . . 5--16
              Poul-Henning Kamp   Don't ``Think of the Internet!'': No
                                  human right is absolute. . . . . . . . . 17--22
                    Phil Vachon   Security Mismatch: Security must be a
                                  business enabler, not a hinderer.  . . . 23--28
         George V. Neville-Neil   Stone Knives and Bear Skins  . . . . . . 29--35
                  Alvaro Videla   Echoes of Intelligence: Textual
                                  interpretation and large language models 36--53
            Samuel W. Stark and   
      A. Theodore Markettos and   
                 Simon W. Moore   How Flexible is CXL's Memory
                                  Protection?: Replacing a sledgehammer
                                  with a scalpel . . . . . . . . . . . . . 54--64
               Ethan Miller and   
      Achilles Benetopoulos and   
        George Neville-Neil and   
               Pankaj Mehra and   
                 Daniel Bittman   Pointers in Far Memory: a rethink of how
                                  data and computations should be
                                  organized  . . . . . . . . . . . . . . . 75--93

ACM Queue: Tomorrow's Computing Today
Volume 21, Number 4, July, 2023

           Thomas A. Limoncelli   Knowing What You Neeed to Know:
                                  Personal, team, and organizational
                                  effectiveness can be improved with a
                                  little preparation . . . . . . . . . . . 5--17
         George V. Neville-Neil   Halfway Around the World: Learn the
                                  language, meet the people, eat the food  18--22
                  Terence Kelly   Protecting Secrets from Computers  . . . 23--43
               Mark Russinovich   Confidential Computing: Elevating Cloud
                                  Security and Privacy: Working toward a
                                  more secure and innovative future  . . . 44--48
                   David Kaplan   Hardware VM Isolation in the Cloud:
                                  Enabling confidential computing with AMD
                                  SEV-SNP technology . . . . . . . . . . . 49--67
     Gobikrishna Dhanuskodi and   
              Sudeshna Guha and   
            Vidhya Krishnan and   
           Aruna Manjunatha and   
           Michael O'Connor and   
                Rob Nertney and   
                    Phil Rogers   Creating the First Confidential GPUs:
                                  The team at NVIDIA brings
                                  confidentiality and integrity to user
                                  code and data for accelerated computing  68--93
    Antoine Delignat-Lavaud and   
CÃ\copyright dric Fournet and   
              Kapil Vaswani and   
             Sylvan Clebsch and   
              Maik Riechert and   
               Manuel Costa and   
               Mark Russinovich   Why Should I Trust Your Code?:
                                  Confidential computing enables users to
                                  authenticate code running in TEEs, but
                                  users also need evidence this code is
                                  trustworthy  . . . . . . . . . . . . . . 94--122

ACM Queue: Tomorrow's Computing Today
Volume 21, Number 5, September, 2023

                Kate Matsudaira   Software Managers' Guide to Operational
                                  Excellence: The secret to being a great
                                  engineering leader? Setting up the right
                                  checks and balances  . . . . . . . . . . 5--12
                    Phil Vachon   The Security Jawbreaker: Access to a
                                  system should not imply authority to use
                                  it. Enter the principle of complete
                                  mediation  . . . . . . . . . . . . . . . 13--21
         George V. Neville-Neil   Dear Diary: On keeping a laboratory
                                  notebook . . . . . . . . . . . . . . . . 22--28
             Geoffrey H. Cooper   Device Onboarding using FDO and the
                                  Untrusted Installer Model: FDO's
                                  untrusted model is contrasted with Wi-Fi
                                  Easy Connect to illustrate the
                                  advantages of each mechanism . . . . . . 29--53
            Harsh Deokuliar and   
      Raghvinder S. Sangwan and   
               Youakim Badr and   
           Satish M. Srinivasan   Improving Testing of Deep-learning
                                  Systems: a combination of differential
                                  and mutation testing results in better
                                  test data  . . . . . . . . . . . . . . . 54--65
              Ivar Jacobson and   
              Alistair Cockburn   Use Cases are Essential: Use cases
                                  provide a proven method to capture and
                                  explain the requirements of a system in
                                  a concise and easily understood format   66--86
 João Varajão and   
       António Trigo and   
                 Miguel Almeida   Low-code Development Productivity: ``Is
                                  winter coming'' for code-based
                                  technologies?  . . . . . . . . . . . . . 87--107

ACM Queue: Tomorrow's Computing Today
Volume 21, Number 6, November, 2023

           Thomas A. Limoncelli   What do Trains, Horses, and Home
                                  Internet Installation have in Common?:
                                  Avoid changes mid-process  . . . . . . . 5--11
         George V. Neville-Neil   Is There Another System?: Computer
                                  science is the study of what can be
                                  automated  . . . . . . . . . . . . . . . 12--15
                  Terence Kelly   Programmer Job Interviews: The Hidden
                                  Agenda . . . . . . . . . . . . . . . . . 16--26
                 David Chisnall   How to Design an ISA: The popularity of
                                  RISC-V has led many to try designing
                                  instruction sets . . . . . . . . . . . . 27--46
            Nicole Forsgren and   
        Eirini Kalliamvakou and   
                   Abi Noda and   
           Michaela Greiler and   
                Brian Houck and   
           Margaret-Anne Storey   DevEx in Action: a study of its tangible
                                  impacts  . . . . . . . . . . . . . . . . 47--77
                Nigel Smart and   
            Joshua W. Baron and   
           Sanjay Saravanan and   
              Jordan Brandt and   
                Atefeh Mashatan   Multiparty Computation: To Secure
                                  Privacy, Do the Math: a discussion with
                                  Nigel Smart, Joshua W. Baron, Sanjay
                                  Saravanan, Jordan Brandt, and Atefeh
                                  Mashatan . . . . . . . . . . . . . . . . 78--100
           Divyansh Kaushik and   
          Zachary C. Lipton and   
               Alex John London   Resolving the Human-subjects Status of
                                  Machine Learning's Crowdworkers: What
                                  ethical framework should govern the
                                  interaction of ML researchers and
                                  crowdworkers?  . . . . . . . . . . . . . 101--127
               Peter Alvaro and   
                  Manuel Rigger   Automatically Testing Database Systems:
                                  DBMS testing with test oracles,
                                  transaction history, and fuzzing . . . . 128--135


ACM Queue: Tomorrow's Computing Today
Volume 22, Number 1, January, 2024

                Kate Matsudaira   Give Your Project a Name: It goes a long
                                  way toward creating a cohesive team with
                                  strong morale  . . . . . . . . . . . . . 5--9
              Poul-Henning Kamp   Free and Open Source Software --- and
                                  Other Market Failures: Open source is
                                  not a goal as much as a means to an end  10--16
         George V. Neville-Neil   Software Drift: Open source forking  . . 17--22
                Queenie Luo and   
           Michael J. Puett and   
               Michael D. Smith   A ``Perspectival'' Mirror of the
                                  Elephant: Investigating language bias on
                                  Google, ChatGPT, YouTube, and Wikipedia  23--47
           Padmal Vitharana and   
                 Shahir A. Daya   Challenges in Adopting and Sustaining
                                  Microservice-based Software Development:
                                  Organizational challenges can be more
                                  difficult than technical ones  . . . . . 48--72
                 Christoph Kern   Developer Ecosystems for Software
                                  Safety: Continuous assurance at scale    73--99
                     Yifei Wang   From Open Access to Guarded Trust:
                                  Experimenting responsibly in the age of
                                  data privacy . . . . . . . . . . . . . . 100--113

ACM Queue: Tomorrow's Computing Today
Volume 22, Number 2, 2024

       Charles Garcia-Tobin and   
                    Mark Knight   Elevating Security with Arm CCA:
                                  Attestation and verification are
                                  integral to adopting confidential
                                  computing  . . . . . . . . . . . . . . . 39--56
                 Jinnan Guo and   
             Peter Pietzuch and   
              Andrew Paverd and   
                  Kapil Vaswani   Trustworthy AI using Confidential
                                  Federated Learning: Federated learning
                                  and confidential computing are not
                                  competing technologies . . . . . . . . . 87--107
         Matthew A. Johnson and   
              Stavros Volos and   
                 Ken Gordon and   
              Sean T. Allen and   
 Christoph M. Wintersteiger and   
             Sylvan Clebsch and   
                John Starks and   
                   Manuel Costa   Confidential Container Groups:
                                  Implementing confidential computing on
                                  Azure container instances  . . . . . . . 57--86
                  Terence Kelly   Zero Tolerance for Bias  . . . . . . . . 19--38
           Thomas A. Limoncelli   Make Two Trips: Larry David's New Year's
                                  resolution works for IT too  . . . . . . 5--14
         George V. Neville-Neil   Structuring Success: The problem with
                                  software structure is people don't
                                  really learn it until they really need
                                  it . . . . . . . . . . . . . . . . . . . 15--18
                Raluca Ada Popa   Confidential Computing or Cryptographic
                                  Computing?: Tradeoffs between
                                  cryptography and hardware enclaves . . . 108--132

ACM Queue: Tomorrow's Computing Today
Volume 22, Number 3, May / June, 2024

                Kate Matsudaira   Working Models for Tackling Tech Debt:
                                  Understand the options to tailor an
                                  approach that suits your needs . . . . . 5--13
              Poul-Henning Kamp   The Expense of Unprotected Free
                                  Software: It's high time FOSS
                                  maintainers got a bit of appreciation    14--18
         George V. Neville-Neil   Repeat, Reproduce, Replicate: The
                                  pressure to publish versus the will to
                                  defend scientific claims . . . . . . . . 15--20
                    Erik Meijer   Virtual Machinations: Using Large
                                  Language Models as Neural Computers:
                                  LLMs can function not only as databases,
                                  but also as dynamic, end-user
                                  programmable neural computers  . . . . . 25--52
               Mansi Khemka and   
                    Brian Houck   Toward Effective AI Support for
                                  Developers: a survey of desires and
                                  concerns . . . . . . . . . . . . . . . . 53--78
                    Qian Li and   
                    Peter Kraft   Transactions and Serverless are Made for
                                  Each Other: If serverless platforms
                                  could wrap functions in database
                                  transactions, they would be a good fit
                                  for database-backed applications . . . . 79--91
            David Collier-Brown   You Don't Know Jack about Bandwidth: If
                                  you're an ISP and all your customers
                                  hate you, take heart. This is now a
                                  solvable problem . . . . . . . . . . . . 92--102

ACM Queue: Tomorrow's Computing Today
Volume 22, Number 4, July, 2024

               Peter Alvaro and   
                   Andrew Quinn   Deterministic Record-and-Replay: Zeroing
                                  in only on the nondeterministic actions
                                  of the process . . . . . . . . . . . . . 
            Catherine Hayes and   
                   David Malone   Questioning the Criteria for Evaluating
                                  Non-cryptographic Hash Functions: Maybe
                                  we need to think more about
                                  non-cryptographic hash functions.  . . . 
            Shuvendu Lahiri and   
        Alexey Svyatkovskiy and   
             Christian Bird and   
                Erik Meijer and   
                   Terry Coatta   Program Merge: What's Deep Learning Got
                                  to Do with It?: a discussion with
                                  Shuvendu Lahiri, Alexey Svyatkovskiy,
                                  Christian Bird, Erik Meijer and Terry
                                  Coatta . . . . . . . . . . . . . . . . . 
         George V. Neville-Neil   Unwanted Surprises: When that joke of an
                                  API is on you  . . . . . . . . . . . . . 
 João Varajão and   
           António Trigo   Assessing IT Project Success: Perception
                                  vs. Reality: We would not be in the
                                  digital age if it were not for the
                                  recurrent success of IT projects.  . . . 
           Mark Russinovich and   
      Cédric Fournet and   
             Greg Zaverucha and   
               Josh Benaloh and   
            Brandon Murdoch and   
                   Manuel Costa   Confidential Computing Proofs: an
                                  alternative to cryptographic
                                  zero-knowledge . . . . . . . . . . . . . 
                    Phil Vachon   Test Accounts: a Hidden Risk: You may
                                  decide the risks are acceptable. But, if
                                  not, here are some rules for avoiding
                                  them.  . . . . . . . . . . . . . . . . . 
                  Jim Waldo and   
                Soline Boussard   GPTs and Hallucination: Why do large
                                  language models hallucinate? . . . . . . 


ACM Queue: Tomorrow's Computing Today
Volume 1, Number ??, 2003

                      Anonymous   Latest Developer Headlines: Watch Out
                                  for Bluetooth Sniffers; The Samba Team
                                  announces Samba 3.0.0 RC1; Aussie
                                  Government to See Microsoft Source Code;
                                  U.S. Tech Workers Training Replacements;
                                  `Apache Geronimo' Looks to J2EE
                                  Implementation . . . . . . . . . . . . . ??