Last update:
Tue Sep 23 08:35:56 MDT 2025
Steve Bourne From the Editors: Finding the Right
Questions . . . . . . . . . . . . . . . 4--4
Avi Freedman Opinion: Securing the Edge . . . . . . . 6, 8--9
Marshall Kirk McKusick Interview with Adam Bosworth . . . . . . 12, 14--21
Christopher Vincent Toolkit: Scripting Web Service
Prototypes . . . . . . . . . . . . . . . 22, 23--27
Mike Burner The Deliberate Revolution: Transforming
Integration With XML Web Services . . . 28--37
Stans Kleijnen and
Srikanth Raju An Open Web Services Architecture . . . 38--46
Ali Arsanjani and
Brent Hailpern and
Joanne Martin and
Peri Tarr Web Services: Promises and Compromises 48--58
George Neville-Neil From the Editors: The Truth About
Embedded Systems . . . . . . . . . . . . 4--4
Randy Harr Interview: a Conversation with Jim Ready 6, 8, 10--13
George V. Neville-Neil Programming Without a Net . . . . . . . 16--23
Telle Whitney and
George Neville-Neil SoC: Software, Hardware, Nightmare,
Bliss . . . . . . . . . . . . . . . . . 24--31
Ivan Godard Division of Labor In Embedded Systems 32--41
Homayoun Shahri Blurring Lines Between Hardware and
Software . . . . . . . . . . . . . . . . 42--49
Rolf Ernst Putting It All Together . . . . . . . . 50--55
Terry Coata From the Editors: Would You Like Some
Data with That? . . . . . . . . . . . . 4--4
Jef Raskin The Woes of IDEs . . . . . . . . . . . . 8, 10--11
Stu Feldman Interview: a Conversation with Mario
Mazzola . . . . . . . . . . . . . . . . 12, 14--16
Michael W. Ritter The Future of WLAN . . . . . . . . . . . 18--27
Bill McFarland and
Michael Wong The Family Dynamics of 802.11 . . . . . 28--38
Lyn Bartram and
Michael Blackstock Designing Portable Collaborative
Networks . . . . . . . . . . . . . . . . 40--49
Robert Poor and
Cliff Bowman and
Charlotte Burgess Auburn Self-Healing Networks . . . . . . . . . 52--59
Robert J. Berger Open Spectrum: a Path to Ubiquitous
Connectivity . . . . . . . . . . . . . . 60--68
Douglas B. Terry and
Venugopalan Ramasubramanian Caching XML Web Services for Mobility 70--78
Randy Harr Storage --- $n$ Sides to Every Story . . 4--4
Josh Coates Opinion: Big Storage: Make or Buy? . . . 6--7
David Patterson Interview: a Conversation with Jim Gray 8, 10--12, 14--17
Dave Anderson You Don't Know Jack about Disks . . . . 20--30
Peter Lyman and
Hal R. Varian Sidebar: How Much Storage is Enough? . . 28--29
Erik Riedel Storage Systems: Not Just a Bunch of
Disks Anymore . . . . . . . . . . . . . 32--41
Jeffrey S. Goldner The Emergence of iSCSI . . . . . . . . . 44--53
Steve Kleiman DAFS: a New High-Performance Networked
File System . . . . . . . . . . . . . . 54--62
Eric Allman and
Marshall Kirk McKusick From the Editors: Viewing Open Source
with an Open Mind . . . . . . . . . . . 6--7
Anonymous News 2.0: Uncrackable passwords;
WebFountain drinks down the Web;
Embracing open source in India . . . . . 8--8
Eric Allman Interview: a Conversation with Chris
DiBona . . . . . . . . . . . . . . . . . 10, 12--19
Jim Barton From Server Room to Living Room . . . . 20--28, 31--32
Paul Ferris The Age of Corporate Open Source
Enlightenment . . . . . . . . . . . . . 34--44
Michael J. Karels Commercializing Open Source Software . . 46--55
John M. Weathersby, Jr. Sidebar: a Foot in the Door: Can Open
Source Find Traction in Government? . . 52--53
Greg Lehey Closed Source Fights Back: SCO vs. the
World --- What Were They Thinking? . . . 56--62
David J. Brown and
George V. Neville-Neal and
Terry Coatta From the Editors: The Developer's Art
Today: Aikido or Sumo? . . . . . . . . . 6--7
Anonymous News 2.0: Outfoxing outsourcing;
Australia pushes for less spam; There's
a bug in my lunchbox . . . . . . . . . . 8--8
Jef Raskin Opinion: User Interface Designers,
Slaves of Fashion . . . . . . . . . . . 10--11
David Brown Interview: a Conversation with Wayne
Rossing . . . . . . . . . . . . . . . . 12, 14--20
Michael Donat Debugging in an Asynchronous World . . . 22--30
Donn M. Seeley Coding Smart: People vs. Tools . . . . . 32--40
George V. Neville-Neal Code Spelunking: Exploring Cavernous
Code Bases . . . . . . . . . . . . . . . 42--48
Peter Phillips and
George Phillips No Source Code? No Problem! . . . . . . 50--57
Terry Coata Another Day, Another Bug . . . . . . . . 58--61
Eric Allman Spam, Spam, Spam, Spam, Spam, the FTC,
and Spam . . . . . . . . . . . . . . . . 62--69
Michael Mayor Sidebar: I Challenge You to Respond? . . 66--67
R. Ballance Book Review: \em Java Precisely, by
Peter Seetoft, MIT Press, 2002, \$14.95,
ISBN 0-262-69276-7} . . . . . . . . . . 70--70
D. Chesley Book Review: \em 802.11 Security, by
Bruce Potter and Bob Fleck, O'Reilly,
2002, \$34.95, ISBN 0-596-00290-4} . . . 70--70
Mike MacFaden From the Editors: CPUs with 2,000 MIPS
per Watt, Anyone? . . . . . . . . . . . 4--4
Jim Coleman and
R. Bob Lee and
Mel Ray Notage and
Bill McFarland Letters: OpenOffice in Home Office; The
``Smart Disk'' Is Already Here; 802.11
in Action . . . . . . . . . . . . . . . 5--5
Anonymous News 2.0: Sugar Cubes Rock; Can a
Personal Server Really Save Your Day?;
Hot Chips Run Cool . . . . . . . . . . . 6--6
Phillip A. Laplante Opinion: Stand and Deliver: Why I Hate
Stand-Up Meetings . . . . . . . . . . . 7--9
Alexander Wolfe Toolkit: Microsoft's Compact Framework
Targets Smart Devices . . . . . . . . . 10--12
David Ditzel Interview: a Conversation with Dan
Dobberpuhl . . . . . . . . . . . . . . . 14--24
Shekhar Borkar Getting Gigascale Chips: Challenges and
Opportunities in Continuing Moore's Law 26--33
Nick Tredennick and
Brion Shimamoto The Inevitability of Reconfigurable
Systems . . . . . . . . . . . . . . . . 34--43
Marc A. Viredaz and
Lawrence S. Brakmo and
William R. Hamburgen Energy Management on Handheld Devices 44--52
Wu-chun Feng Making a Case for Efficient
Supercomputing . . . . . . . . . . . . . 54--64
Andrew Grover Modern System Power Management . . . . . 66--72
Caspar Boekhoudt The Big Bang Theory of IDEs . . . . . . 74--82
Diomidis Spinellis Reading, Writing, and Code . . . . . . . 84--89
Joan Horvath Book Review: \em Lean Software
Development: An Agile Toolkit, by Mary
Poppendieck and Tom Poppendieck,
Addison-Wesley, 2003, \$39.99, ISBN
0-321-15078-3} . . . . . . . . . . . . . 90--91
Fernando Berzal Book Review: \em Design Methods for
Reactive Systems, by R. J. Wieringa,
Morgan Kaufmann, 2002, \$64.95, ISBN
1-55860-755-2} . . . . . . . . . . . . . 90--91
Anonymous Calendar . . . . . . . . . . . . . . . . 92--92
Eric Allman Curmudgeon: Wireless Networking
Considered Flaky . . . . . . . . . . . . 96, 95
Wendy A. Kellogg From the Editors . . . . . . . . . . . . 5--5
Andrew Eberbach and
Jef Raskin and
Mike Frisch and
Mark Scott and
Harry Rudin Letters: Slaves of Fashion; On Heretics
and Zealots; The FTC and Spam . . . . . 6--6
Anonymous News 2.0: Gates to Get ATM Free?; RFIDs
Reverse Roles; Moore's Law of
Cyber-Crime: Say It Isn't so; WI-FI $+$
VoIP $=$ My New Phone? . . . . . . . . . 8--8
Marshall T. Rose Opinion: On Helicopters and Submarines 10, 12--13
Alexander Wolfe Toolkit: Eclipse: a Platform Becomes an
Open-Source Woodstock . . . . . . . . . 14--16
Eric Allman Interview: a Conversation with Peter
Ford . . . . . . . . . . . . . . . . . . 18, 20--27
John C. Tang and
James Bo Begole Beyond Instant Messaging . . . . . . . . 28--37
Frank Jania Broadcast Messaging: Messaging to the
Masses . . . . . . . . . . . . . . . . . 38--43
Joe Hildebrand Nine IM Accounts and Counting . . . . . 44--50
George W. Fitzmaurice and
Azam Khan and
William Buxton and
Gordon Kurtenback and
Ravin Balakrishnan Sentient Data Access via a Diverse
Society of Devices . . . . . . . . . . . 52--62
Seth Hallem and
David Park and
Dawson Engler Uprooting Software Defects at the Source 64--71
William Stevenson Book Review: \em Cocoa in a Nutshell by
Michael Beam and James Duncan Davidson,
O'Reilly & Associates, 2003, \$39.95,
ISBN 0-596-00462-1} . . . . . . . . . . 72--72
V. B. Kaujalgi Book Review: \em The Bug by Ellen
Ullman, Nan A. Talese/Doubleday, 2003,
\$23.95, ISBN 0-385-50860-3} . . . . . . 72--72
Anonymous Calendar . . . . . . . . . . . . . . . . 74--74
Jakob Nielsen Curmudgeon: IM, Not IP (Information
Pollution) . . . . . . . . . . . . . . . 76, 75
Edward Grossman From the Editors: New World Order . . . 5--5
Matt Elberson and
Kurth Guntheroth and
Rodney M. Bates and
Donald E. Amby Letters: Software Development Tools:
Cautionary Tales; Coding for Readability 6--6
Anonymous News 2.0: China's Tech Blast-Off; Thou
Shalt Not Print; Dust Dreams . . . . . . 8--8
Jef Raskin Opinion: Silicon Superstitions . . . . . 10--12
Alexander Wolfe Toolkit: GNU Tools, Still Relevant? . . 14, 16--17
Tony Wasserman Interview: a Conversation with Steve
Hagan . . . . . . . . . . . . . . . . . 18, 20--25
Michael Turnlund Distributed Development: Lessons Learned 26--31
Ken Coar The Sun Never Sits on Distributed
Development . . . . . . . . . . . . . . 32--39
Li-Te Cheng and
Cleidson R. B. de Souza and
Susanne Hupfer and
John Patterson and
Steven Ross Building Collaboration into IDEs . . . . 40--50
Judith S. Olson and
Gary M. Olson Culture Surprises in Remote Software
Development Teams . . . . . . . . . . . 52--59
Gordon Bell Sink or Swim: Know When It's Time to
Bail . . . . . . . . . . . . . . . . . . 60--67
James A. Whittaker and
Herbert H. Thompson Black Box Debugging . . . . . . . . . . 68--74
Lee Imrey Book Review: \em The Code Book: The
Science of Secrecy from Ancient Egypt to
Quantum Cryptography by Simon Singh,
Delacorte Press, 2000, \$15.00, ISBN
0-385-49532-3} . . . . . . . . . . . . . 76--76
Fernando Berzal Book Review: \em Agile Software
Development, Principles, Patterns, and
Practices by Robert C. Martin, Prentice
Hall, 2002, \$55.00, ISBN 0-13-597444-5} 76--76
Anonymous Calendar . . . . . . . . . . . . . . . . 77--77
Eric Allman Curmudgeon: The Economics of Spam . . . 80, 78--79
Edward Grossman From the Editors: Fund and Games and
Software Development . . . . . . . . . . 5--5
Randy Senske and
Azam Khan and
Taylor Cowan and
Phillip Laplante and
The Editors Letters: Sentient Data: The Notion of
Location; Stand-Up Meetings Really Suck;
Errata: The Game of Life . . . . . . . . 6--6
Anonymous News 2.0: Boba Fett on the Microsoft
Payroll?; Wi-Fi Goes WAPI; Photons and
Molecules: a New Partnership; SETI Where
Are You, Mersenne Prime? . . . . . . . . 8--8
Phillip A. Laplante and
Colin J. Neill Opinion: The Demise of the Waterfall
Model Is Imminent . . . . . . . . . . . 10--15
Alexander Wolfe Toolkit: Java is Jumpin' . . . . . . . . 16--19
Chris DiBona Interview: a Conversation with Will
Harvey . . . . . . . . . . . . . . . . . 20--27
Jonathan Blow Game Development: Harder Than You Think 28--37
Michi Henning Massively Multiplayer Middleware . . . . 38--45
Andrew M. Phelps and
David M. Parks Fun and Games: Multi-Language
Development . . . . . . . . . . . . . . 46--56
Alexander Nareyek AI in Computer Games . . . . . . . . . . 58--65
Dean Macri The Scalability Problem . . . . . . . . 66--73
Bruce Schneier Sensible Authentication . . . . . . . . 74--78
John Richards and
Jim Christensen People in Our Software . . . . . . . . . 80--86
Joy Gumz Book Review: \em Hacking Exposed:
Network Security Secrets and Solutions,
4th ed., by Stuart McClure, Joel
Scambray, and George Kurtz, McGraw-Hill,
2003, \$49.99, ISBN 0-07-222742-7} . . . 88--88
Martin Schweitzer Book Review: \em Linux in a Nutshell,
4th ed., by Ellen Siever, Stephen
Figgins, and Aaron Weber, O'Reilly
Books, 2003, \$39.95, ISBN
0-596-00482-6} . . . . . . . . . . . . . 88--88
Anonymous Calendar . . . . . . . . . . . . . . . . 90--90
Josh Coates Curmudgeon: When Bad People Happen to
Good Games . . . . . . . . . . . . . . . 92, 91
Richard F. Lyon From the Editors: DSP 4 You . . . . . . 6--6
Jack M. Nilles and
Joe Fenn and
Jim Gray Letters: Required Reading for
Telemanagers; State of the Carrier
Industry . . . . . . . . . . . . . . . . 7--7
Anonymous News 2.0: The Farmer and the Hacker;
Milk and Algorithms Make for Strong
Bones; Keep Your Distance . . . . . . . 8--8
Alexander Wolfe Toolkit: Get Your Graphics On: OpenGL
Advances with the Times . . . . . . . . 10, 12--13
Robert Broderson Interview: a Conversation with Teresa
Meng . . . . . . . . . . . . . . . . . . 14, 16--21
Gene Frantz and
Ray Simar DSP: Of Processors and Processing . . . 22--30
Homayoun Shahri Mapping Algorithms to DSP Architectures 32--41
W. Patrick Hays DSPs: Back to the Future . . . . . . . . 42--51
William J. Dally and
Ujval J. Kapasi and
Brucek Khailany and
Jung Ho Ahn and
Abhishek Das Stream Processors: Programmability and
Efficiency . . . . . . . . . . . . . . . 52--62
Boris Murmann and
Bernhard Boser Digitally Assisted Analog Integrated
Circuits . . . . . . . . . . . . . . . . 64--71
Alex E. Bell Death by UML Fever . . . . . . . . . . . 72--80
Grady Booch The Fever is Real . . . . . . . . . . . 81--81
Laury Verner BPM: The Promise and the Challenge . . . 82--91
J. P. E. Hidgson Book Review: \em Linux on the Mainframe
by John Eilert, Maria Eisenhaendler,
Dorothea Matthaeu, and Ingol Salm,
Prentice Hall Professional Technical
Reference, 2003, \$49.99, ISBN
0-13-101415-3} . . . . . . . . . . . . . 92--92
H. I. Kilov Book Review: \em The Simplicity Shift:
Innovative Design Tactics in a Corporate
World by Scott Jenson, Cambridge
University Press, 2002, \$25, ISBN
0-521-52749-X} . . . . . . . . . . . . . 92--92
Anonymous Calendar . . . . . . . . . . . . . . . . 94--94
Stan Kelly-Bootle Curmudgeon: Damnéd Digits . . . . . . . . 96, 95
Edward Grossman From the Editors: Search --- An
Enterprising Affair . . . . . . . . . . 6--6
Lynn H. Maxson and
Joseph M. Saur and
Colin Neill and
Phillip Laplante Letters: Waterfall Redux . . . . . . . . 8--8
Anonymous News 2.0: Office Suites, Meet NBOR;
Security Comes First, Eventually; Three
Strikes and You're Out; LOTR SneakerNet
iPod . . . . . . . . . . . . . . . . . . 9--9
Jef Raskin Opinion:The GIGO Principle and Voting
Machines . . . . . . . . . . . . . . . . 10--11
Alexander Wolfe Toolkit: Intel Is Stealth Source of
Heavy-Duty Software Tools . . . . . . . 12, 14, 16--17
Steve Kirsch Interview: a Conversation with Matt
Wells . . . . . . . . . . . . . . . . . 18, 20--24
William A. Woods Searching vs. Finding . . . . . . . . . 26--35
Rajat Mukherjee and
Jianchang Mao Enterprise Search: Tough Stuff . . . . . 36--46
Anna Patterson Why Writing Your Own Search Engine Is
Hard . . . . . . . . . . . . . . . . . . 48--53
Mike Cafarella and
Doug Cutting Building Nutch: Open Source Search . . . 54--61
Nick Porcino Gaming Graphics: The Road to Revolution 62--71
John Stone and
Sarah Merrion Instant Messaging or Instant Headache? 72--80
Susan M. Merritt Book Review: \em Extreme Programming
Refactored: The Case Against XP by Matt
Stephens and Doug Rosenberg, APress,
2003, \$39.99, ISBN 1-590-59096-1} . . . 81--81
Joy Gumz Book Review: \em Computer and Intrusion
Forensics edited by George Mohay, Alison
Anderson, Byron Collie, Olivier de Vel,
and Rod McKemmish, Artech House, 2003,
\$79.00, ISBN 1-580-53369-8} . . . . . . 81--81
Anonymous Calendar . . . . . . . . . . . . . . . . 82--82
David J. Brown Curmudgeon: Search Hurts . . . . . . . . 84, 83
Eric Allman and
Marshall Kirk McKusick From the Editors: Open Source Revisited 8--9
Mike Brady and
Vladimir Sanchez Letters: Sender Pays?; Errata:
[Alexander Nareyek, AI in Computer
Games, ACM Queue 1(10) 58--65 (2004)] 10--10
Anonymous News 2.0: Big Book to Better the World;
A Cardboard Computer?; Obje---That's
French for Interoperability . . . . . . 11--11
Rodney Bates Opinion: Buffer Overrun Madness . . . . 12, 14
James Russell Interview: a Conversation with Sam
Leffler . . . . . . . . . . . . . . . . 16--22
Jordan Hubbard Open Source to the Core . . . . . . . . 24--31
David Ascher Is OS Right for You? (A Fictional Case
Study) . . . . . . . . . . . . . . . . . 32--38
Jay Michaelson There's No Such Thing as a Free
(Software) Lunch . . . . . . . . . . . . 40--47
Bart Decrem Desktop Linux: Where Art Thou? . . . . . 48--56
Andy Currid TCP Offload to the Rescue . . . . . . . 58--65
Ramana Rao From IR to Search, and Beyond . . . . . 66--73
Dennis Anderson Book Review: \em RFID Handbook:
Fundamentals and Applications in
Contactless Smart Cards and
Identification by Klaus Finkenzeller,
John Wiley & Sons, 2003, \$125, ISBN
0-470-84402-7} . . . . . . . . . . . . . 74--74
S. V. Nagaraj Book Review: \em Advances in
Evolutionary Computing: Theory and
Applications by Ashish Ghosh and
Shigeyoshi Tsutsui, Springer-Verlag,
2003, \$109, ISBN 3-540-43330-9} . . . . 74--74
Anonymous Calendar . . . . . . . . . . . . . . . . 76--76
Josh Coates Curmudgeon: a Bigot by Any Other
Name\ldots . . . . . . . . . . . . . . . 80, 78
Edward Grossman From the Editors: The New Screen of
Death . . . . . . . . . . . . . . . . . 8--8
Subir Sengupta and
Chris Maeda and
Pamela R. Mason and
Jayson Durham and
Cynthia Browning and
Mike Zom and
Chris Vickery and
Jon Ogden and
Stephen Vinowski and
Dave McComb and
Peter Thomas Letters: Crossing Time Zones; Is DSP
Right for You?; Can Business Process
Management Deliver?; That Kelly-Bootle!;
Stricken by UML Fever; Errata [Alexander
Wolfe, Toolkit: Get Your Graphics On:
OpenGL Advances with the Times, ACM
Queue 2(1), 10, 12--13 (2004)] . . . . . 10--10
Anonymous News 2.0: Communications from a Field
Near You; Light-Speed Disk Drives;
Hand-Delivered Curried Spam?; Mind
Control for the Masses? . . . . . . . . 12--12
Phillip A. Laplante Opinion: First, Do No Harm: a
Hippocratic Oath for Software
Developers? . . . . . . . . . . . . . . 14--18
Alexander Wolfe Toolkit: Grid Tools: Coming to a Cluster
Near You . . . . . . . . . . . . . . . . 20--23
Stuart Feldman Interview: a Conversation with Brewster
Kahle . . . . . . . . . . . . . . . . . 24, 26--30, 32--33
Jim Morrison Blaster Revisited . . . . . . . . . . . 34--43
Marcus J. Ranum Security: The root of the Problem . . . 44--49
Ben Laurie Network Forensics . . . . . . . . . . . 50--56
Herbert H. Thompson and
Richard Ford Perfect Storm: The Insider, Naivety, and
Hostility . . . . . . . . . . . . . . . 58--65
Kenneth N. Lodding The Hitchhiker's Guide to Biomorphic
Software . . . . . . . . . . . . . . . . 66--75
Shrisha Rao Book Review: \em Molecular Computing
edited by Tanya Sienko, Andrew
Adamatzky, Nicholas G. Rambidi, and
Michael Conrad, MIT Press, 2003,
\$45.00, ISBN 0-262-19487-2} . . . . . . 76--76
Gregory D. Peterson Book Review: \em Embedded Software for
SoC, edited by Ahmed Amine Jerraya,
Sungjoo Yoo, Norbert When, and Diederik
Verkest, Kluwer Academic Publishers,
2003, \$174.00, ISBN 1-4020-7528-6} . . 76--76
Anonymous Calendar . . . . . . . . . . . . . . . . 78--78
Stan Kelly-Bootle Curmudgeon: From This Moment On . . . . 80, 79
Edward Grossman From the Editors: Virtually Yours . . . 8--8
Robert Cody and
Lawrence C. Paulson and
Todd Greer and
Rodney Bates and
Daniel Myer and
Gary Hewitt and
Jay Michaelson and
John C. Nash and
Josh Coates Letters: Buffer Overrun Madness; Open
Source: All Grown Up?; When is Free
Really \em Free?; It's Not Cool to be a
Bigot . . . . . . . . . . . . . . . . . 10--10
Anonymous News 2.0: Leave it to the Irish; The
Tammy Faye Scam; Throttling Back Network
Attacks . . . . . . . . . . . . . . . . 12--12
Jef Raskin Opinion: For Want of a Comma, the
Meaning Was Lost . . . . . . . . . . . . 14--16
Alex Wolfe Toolkit: Samba Does Windows-to-Linux
Dance . . . . . . . . . . . . . . . . . 18--21
Anonymous What's on Your Hard Drive? . . . . . . . 22--22
Eric Allman Interview: a Conversation with James
Gosling . . . . . . . . . . . . . . . . 24--33
Mendel Rosenblum The Reincarnation of Virtual Machines 34--40
Poul-Henning Kamp and
Robert Watson Building Systems to Be Shared, Securely 42--51
Bob Supnik Simulators: Virtual Machines of the Past
(and Future) . . . . . . . . . . . . . . 52--58
John Viega and
Matt Messier Security is Harder than You Think . . . 60--65
Douglas C. Schmidt and
Aniruddha Gokhale and
Balachandran Natarajan Leveraging Application Frameworks . . . 66--75
Frank Pospiech Book Review: \em Critical Testing
Process: Plan, Prepare, Perform,
Perfect, by Rex Black, Addison-Wesley
Professional, 2003, \$49.99, ISBN
0-201-74868-1} . . . . . . . . . . . . . 76--76
A. K. Menon Book Review: \em Balancing Agility and
Discipline: A Guide for the Perplexed,
by Barry Boehm and Richard Turner,
Addison-Wesley Professional, 2003,
\$29.99, ISBN 0-321-18612-5} . . . . . . 76--76
Anonymous Calendar . . . . . . . . . . . . . . . . 78--78
Stan Kelly-Bootle Curmudgeon: Without a NULL That String
Would Never End . . . . . . . . . . . . 80, 79
Edward Grossman From the Editors: Calling All Cars
[overstrike] Readers . . . . . . . . . . 8--8
Jeffrey R. Coates and
Vadim Kavalerov and
Brian Goetz and
Marcus Ranum and
Ryan McLoughlin and
Robert Angelino Letters: Buffer Overruns and Everyone;
Another Look at Security Problems . . . 10--10
Anonymous News 2.0: Smoke Signals, Cellphone
Style; File Sharing: Crime and
Punishment Unplugged; Musican
Composition by Any\_Body . . . . . . . . 11--11
Rodney Bates Opinion: Schizoid Classes . . . . . . . 12--15
Alexander Wolfe Toolkit: Longhorn Ties Platform Apps to
Core Operating System . . . . . . . . . 16--19
Anonymous What's on Your Hard Drive? . . . . . . . 20--20
Lucy Sanders Interview: a Conversation with Donald
Peterson . . . . . . . . . . . . . . . . 22--29
Phil Sherburne and
Cary Fitzgerald You Don't Know Jack About VoIP . . . . . 30--38
James E. Coffman Not Your Father's PBX? . . . . . . . . . 40--47
Sudhir R. Ahuja and
Robert Ensor VoIP: What is it Good for? . . . . . . . 48--55
Douglas C. Sicker and
Tom Lookabaugh VoIP Security: Not an Afterthought . . . 56--64
Gordon Bell A Time and a Place for Standards . . . . 66--74
Hector Zenil Chavez Book Review: \em Quantum Computing
(Natural Computing Series), 2nd ed., by
Mika Hirvensalo, Springer-Verlag, 2004,
\$54.95, ISBN 3-540-40704-9} . . . . . . 76--76
Andre Mariën Book Review: \em Security Warrior by
Cyrus Peikari and Anton Chuvakin,
O'Reilly, 2004, \$44.95, ISBN
0-596-00545-8} . . . . . . . . . . . . . 76--76
Anonymous Calendar . . . . . . . . . . . . . . . . 78--78
Stan Kelly-Bootle Curmudgeon: Vote Early, Vote Often . . . 80--79
Edward Grossman From the Editors: RFID isn't science
fiction . . . . . . . . . . . . . . . . 10--10
Edward Grossman Letters . . . . . . . . . . . . . . . . 12--12
Edward Grossman News 2.0 . . . . . . . . . . . . . . . . 13--13
Edward Grossman What's on your hard drive? . . . . . . . 14--14
George Neville-Neil Kode Vicious . . . . . . . . . . . . . . 16--18
Barbara Simons Electronic voting systems: the good, the
bad, and the stupid . . . . . . . . . . 20--26
Alexander Wolfe There's still some life left in Ada . . 28--31
George Neville-Neil Interview: a conversation with Mike
Deliman . . . . . . . . . . . . . . . . 32--39
Roy Want The magic of RFID . . . . . . . . . . . 40--48
Sanjay Sarma Integrating RFID . . . . . . . . . . . . 50--57
Marshall Kirk McKusick and
George V. Neville-Neil Thread scheduling in FreeBSD 5.2 . . . . 58--64
Kang Su Gatlin Trials and tribulations of debugging
concurrency . . . . . . . . . . . . . . 66--73
Edward Grossman Review of \em Dynamic Reconfiguration:
Architectures and Algorithms by
Ramachandran Vaidyanathan and Jerry L.
Trahan. Plenum Publishing, 2003, ISBN
0-306-48189-8 . . . . . . . . . . . . . 74--74
Edward Grossman Review of \em Immunity-based systems by
Yoshiteru Ishida. Springer-Verlag, 2004,
ISBN 3-540-00896-9 . . . . . . . . . . . 74--74
Edward Grossman Calendar . . . . . . . . . . . . . . . . 76--76
Phillip Laplante The burning bag of dung: and other
environmental antipatterns . . . . . . . 80
Edward Grossman From the Editors: The guru code . . . . 10--10
Ulrich Grude and
Rodney Bates and
Annelise Gimpel and
Stan Kelly-Bootle and
Henri Socha and
Bob Supnik and
Ian Phillips Letters: Schizoid Classes; Don't Forget
to Vote!; Something about Simulators;
The Bigots of the World . . . . . . . . 12--12
John Stanik News 2.0: New Web Provides
Battery-powered Option; There's Nothing
Like a Map; Shall I Compare Thee to a
Big Squeeze?; Linux Support: a Black
Hole? . . . . . . . . . . . . . . . . . 14--14
Edward Grossman What's on your hard drive? . . . . . . . 16--16
George Neville-Neil Kode Vicious strikes again . . . . . . . 18--21
Steve Bourne Interview: a conversation with Bruce
Lindsay . . . . . . . . . . . . . . . . 22--33
Aaron B. Brown Oops! Coping with human error in IT
systems . . . . . . . . . . . . . . . . 34--41
Brendan Murphy Automating software failure reporting 42--48
Paul P. Maglio and
Eser Kandogan Error messages: what's the problem? . . 50--55
Adam Kolawa Outsourcing: devising a game plan . . . 56--62
Vijay Gill Lack of priority queuing considered
harmful . . . . . . . . . . . . . . . . 64--69
Bayard Kohlhepp Review of \em Network Distributed
Computing: Fitscapes and Fallacies by
Max K. Goff. Prentice Hall Professional
Technical Reference, 2003, ISBN
0-13-100152-3 . . . . . . . . . . . . . 70--70
Rita Puzmanova Review of \em Wi-Foo: The Secrets of
Wireless Hacking by Andrew Vladimirov,
Konstantin V. Gravrilenko, and Andrei A.
Mikhailovsky. Pearson Education, 2004,
ISBN 0-321-20217-1 . . . . . . . . . . . 70--70
Edward Grossman Calendar . . . . . . . . . . . . . . . . 72--72
Edward Grossman Careers . . . . . . . . . . . . . . . . 74--77
Rodney Bates Curmudgeon: Programming in Franglais . . 80, 78
Edward Grossman From the Editors: The big programming
languages issue . . . . . . . . . . . . 10--10
Charles Kerpelman and
The Editors and
Martin Smith and
Harry Rudin and
Yaacov Fenster and
Marcus Ranum and
Scott Howser and
Alexander Wolfe Letters: Kode Vicious Wants You;
Deliman's da Man; In Want of Nothing;
The \tt root of the Problem, Redux;
Longhorn and WinFS . . . . . . . . . . . 12--12
John Stanik News 2.0: It Isn't Going Away \ldots But
IT Jobs Are; 4 GHz Goes Bust;
Trojan-Spyware Deathmatch; Desktop
Search Madness . . . . . . . . . . . . . 13--13
Edward Grossman What's on your hard drive? . . . . . . . 14--14
George Neville-Neil Kode Vicious the return . . . . . . . . 16--18
Stuart Feldman Interview: a conversation with Alan Kay 20--30
John R. Mashey Languages, levels, libraries, and
longevity . . . . . . . . . . . . . . . 32--38
Roger Sessions Fuzzy boundaries: objects, components,
and Web services . . . . . . . . . . . . 40--47
Gregory V. Wilson Extensible programming for the 21st
Century . . . . . . . . . . . . . . . . 48--57
Donn Seeley How Not to Write Fortran in Any Language 58--65
Michael W. Shapiro Self-healing in modern operating systems 66--75
M. S. Joy Review of \em Eclipse by Steve Holzner.
O'Reilly & Associates, 2004, \$44.95,
ISBN 0-596-00641-1} . . . . . . . . . . 76--76
T. Portele Review of \em Spoken Dialogue Technology
by Michael F. McTear. Springer-Verlag,
2004, \$59.95, ISBN 1-85233-672-2} . . . 76--76
Edward Grossman Calendar . . . . . . . . . . . . . . . . 77--77
Stan Kelly-Bootle Curmudgeon: Linguae Francae . . . . . . 80, 78--79
Edward Grossman From the Editors: Puttin' the \em Queue
in QA . . . . . . . . . . . . . . . . . 8--8
Tim Eure and
Ben Kuehlhorn and
Vijay Gill and
James Synge and
Edward Weir and
The Editors Letters: RFID Revisited; \em Queueing Up
Priority Queueing; Guru Code Overload 10--10
Edward Grossman What's on your hard drive? . . . . . . . 11--11
George Neville-Neil Kode Vicious Unleashed . . . . . . . . . 12--13
Jim Gray Interview: a conversation with Tim Bray 20--25
Stuart Feldman Quality assurance: much more than
testing . . . . . . . . . . . . . . . . 26--29
Keith Stobie Too darned big to test . . . . . . . . . 30--37
William W. White Sifting through the software sandbox:
SCM meets QA . . . . . . . . . . . . . . 38--44
Michael Donat Orchestrating an automated test lab . . 46--53
Mark Kobayashi-Hillary A passage to India . . . . . . . . . . . 54--60
Arun Ektare Review of \em Designing Software for the
Mobile Context: a Practitioner's Guide
(Computer Communications and Networks)
by Roman Longoria (Ed.),
Springer-Verlag, 2004, \$69.95, ISBN
1-85233-785-0} . . . . . . . . . . . . . 61--61
Radu State Review of \em Network Security
Architectures by Sean Convery, Cisco
Press, 2004, \$55.00, ISBN
1-58705-115-X} . . . . . . . . . . . . . 61--61
Edward Grossman Calendar . . . . . . . . . . . . . . . . 62--62
Terry Coatta Curmudgeon: Traipsing through the QA
tools desert . . . . . . . . . . . . . . 64--64
David J. Brown From the editors: An update on software
updates . . . . . . . . . . . . . . . . 10--11
Kurt Gunteroth and
Greg Wilson and
Michael Erdmann and
Dmitriy Vasilev and
Ed Ravin and
Vivek Rao Letters: Extensible Programming,
Extended Edition; A Lesson in
Self-Healing; Fortran Lives . . . . . . 12--14
John Stanik News 2.0: a Patent Reduction in IP
Squabbles; Widgets, Macintosh Style;
Biometrics Goes $3$D . . . . . . . . . . 16--16
Edward Grossman What's on your hard drive? . . . . . . . 18--18
George Neville-Neil Kode Vicious reloaded . . . . . . . . . 20, 22
Joseph Dadzie Understanding software patching . . . . 24--30
George Brandman Patching the enterprise . . . . . . . . 32--39
Dorian Birsan On plug-ins and extensible architectures 40--46
Alex E. Bell UML fever: diagnosis and recovery . . . 48--56
David Bellin Review of \em PHP5 and MySQL Bible by
Tim Converse and Joyce Park, Clark
Morgan Wiley, 2004, \$49.99, ISBN
0-7645-5746-7} . . . . . . . . . . . . . 58--58
R. S. Chang Review of \em Integration-Ready
Architecture and Design: Software
Engineering with XML, Java, .NET,
Wireless, Speech, and Knowledge
Technologies by Jeff Zhuk, Cambridge
University Press, 2004, \$75.00, ISBN
0-521-52583-7} . . . . . . . . . . . . . 58--58
Edward Grossman Calendar . . . . . . . . . . . . . . . . 60--60
Jef Raskin Curmudgeon: Comments are more important
than code . . . . . . . . . . . . . . . 64, 62--63
Edward Grossman From the Editors: I am an abstraction
layer . . . . . . . . . . . . . . . . . 8--8
Philip Burgess and
Miriam Amos Nihart and
Manfred Berndtgen and
Dan Griffin and
Gabe da Silveira Letters: QA $ ! = $ Testing; More Common
than You Think; Kay-OK . . . . . . . . . 10--10
John Stanik News 2.0: Gridding for a Cure; Wanted:
Windows Robots; Lost in Licenses . . . . 11--11
Edward Grossman What's on your hard drive? . . . . . . . 14--14
George Neville-Neil Kode Vicious battles on . . . . . . . . 15--17
James Hamilton Interview: a conversation with Pat
Selinger . . . . . . . . . . . . . . . . 18--28
Jim Gray and
Mark Compton A call to arms . . . . . . . . . . . . . 30--38
James Ostell Databases of discovery . . . . . . . . . 40--48
Margo Seltzer Beyond relational databases . . . . . . 50--58
A. Mariën Review of \em Exploiting Software: How
to Break Code by Greg Hoglund and Gary
McGraw, Addison-Wesley, 2004, \$49.99,
ISBN 0-201-78695-8} . . . . . . . . . . 60--60
Carlos F. Enguix Review of \em Explorer's Guide to the
Semantic Web by Thomas B. Passin,
Manning Publications, 2004, \$39.95,
ISBN 1-932394-20-6} . . . . . . . . . . 61--61
Edward Grossman Calendar . . . . . . . . . . . . . . . . 62--62
Stan Kelly-Bootle Curmudgeon: File under ``unknowable!'' 64, 63
John Stanik From the Editors: Mobile applications
get real . . . . . . . . . . . . . . . . 8--8
David H. Winfield and
Erik Hoel and
The Editors and
Georges Brigham and
Stan Kelly-Bootle Letters: Readers' Comments are
Important, Too; APL $=$ A Possible
Lingua Franca? . . . . . . . . . . . . . 10--10
John Stanik News 2.0: Kernel Solid, But Vulnerable;
IT Security Get Physical; A Warm
Reception for Reject Chips . . . . . . . 14--14
Edward Grossman What's on your hard drive . . . . . . . 15--15
George Neville-Neil Kode Vicious vs. Mothra . . . . . . . . 16--18
Kirk McKusick Interview: a conversation with Tim
Marsland . . . . . . . . . . . . . . . . 20--28
Bruce Zenel Enterprise-grade wireless . . . . . . . 30--37
Fred Kitson Mobile media: making it a reality . . . 38--47
Tom Gerstel Streams and standards: delivering mobile
video . . . . . . . . . . . . . . . . . 48--53
Kevin Fall and
Steve McCanne You don't know jack about network
performance . . . . . . . . . . . . . . 54--59
G. K. Jenkins Review of \em Expert .NET Programming by
Simon Robinson, Apress, 2004, \$59.99,
ISBN 1-59059-222-0} . . . . . . . . . . 60--60
Marlin Thomas Review of \em Building Clustered Linux
Systems by Robert W. Lucke, Prentice
Hall PTR, 2004, \$49.99, ISBN
0-13-144853-6} . . . . . . . . . . . . . 60--60
Edward Grossman Calendar . . . . . . . . . . . . . . . . 61--61
Phillip Laplante Curmudgeon: Mal Managerium: a Field
Guide . . . . . . . . . . . . . . . . . 64, 62--63
Randy Harr From the editors: On feeling secure in
an unsafe world . . . . . . . . . . . . 8--8
Vladimir Sanchez and
Heidi Markovitz Letters: Selinger's Inspiring Words;
Plug-In Predecessors . . . . . . . . . . 12--12
John Stanik News 2.0: Losing our Edge? The Real Cost
of Linux; Say No to Crackberries . . . . 14--14
Jim Maurer What's on your hard drive? . . . . . . . 16--16
George Neville-Neil Kode vicious gets dirty . . . . . . . . 18--20
Jim Maurer Interview: a conversation with Peter
Tippett and Steven Hofmeyr . . . . . . . 22--32
Thomas Wadlow The answer is $ 42 $ of course . . . . . 34--39
John Viega Security---problem solved? . . . . . . . 40--50
Bruce Schneier Attack trends: 2004 and 2005 . . . . . . 52--53
Ken Arnold Programmers are people, too . . . . . . 54--59
Don Chand Review of \em Privacy: What Developers
and IT Professionals Should Know by J.
C. Cannon, Addison-Wesley Professional,
2004, \$49.99. ISBN 0-321-22409-4} . . . 60--60
A. Mariën Review of \em IPv6 Network Programming
by Jun-ichiro itojun Hagino, Digital
Press, 2004, \$49.95, ISBN
1-55558-318-0} . . . . . . . . . . . . . 60--60
Jim Maurer Calendar . . . . . . . . . . . . . . . . 61--61
Rodney Bates Curmudgeon: Syntactic heroin . . . . . . 64, 62--63
Stuart Feldman From the editors: Distributed computing
in the modern enterprise . . . . . . . . 8--8
John Stanik News 2.0: ``Ransom-ware'' on the loose;
Adopt IPv6 or die; IBM Steps up on Linux
training . . . . . . . . . . . . . . . . 10--10
Jim Maurer What's on your hard drive? . . . . . . . 12--12
George Neville-Neil Kode Vicious: Kode Vicious Cycles On . . 14--16
Jim Maurer Interview: a conversation with David
Anderson . . . . . . . . . . . . . . . . 18--25
Ian Foster and
Steven Tuecke Describing the elephant: the different
faces of IT as service . . . . . . . . . 26--29
Dean Jacobs Enterprise software as service . . . . . 36--42
Pankaj Kumar Web services and IT management . . . . . 44--49
Paul Strong Enterprise Grid computing . . . . . . . 50--59
Sajjad Khan Review of ``Struts Recipes by George
Franciscus and Danilo Gurovich'',
Manning Publications, 2004, \$44.95 ISBN
1-932394-24-9} . . . . . . . . . . . . . 60--60
Radu State Review of ``Gray Hat Hacking: The
Ethical Hacker's Handbook by Shon
Harris, Allen Harper, Chris Eagle,
Jonathan Ness, and Michael Lester'',
McGraw-Hill Osborne Media, 2004, \$49.99
ISBN 0-07-225709-1} . . . . . . . . . . 60--60
Jim Maurer Calendar . . . . . . . . . . . . . . . . 61--61
Stanley Kelly-Bootle Curmudgeon: Call that gibberish . . . . 64, 62--63
Jim Maurer News 2.0: Open Source/2; Anti-spam
activism \ldots or vigilantism?; Ride,
robot, ride . . . . . . . . . . . . . . 8--8
Jim Maurer What's on your hard drive? . . . . . . . 10--10
George Neville-Neil Kode Vicious: KV the Konqueror . . . . . 12--14
Jim Maurer Interview: a conversation with Roger
Sessions and Terry Coatta . . . . . . . 16--25
Kunle Olukotun and
Lance Hammond The future of microprocessors . . . . . 26--29
Richard McDougall Extreme software scaling . . . . . . . . 36--46
Luiz André Barroso The price of performance . . . . . . . . 48--53
Herb Sutter and
James Larus Software and the concurrency revolution 54--62
Mache Creeger Curmudgeon: Multicore CPUs for the
masses . . . . . . . . . . . . . . . . . 64, 63
Charlene O'Hanlon From the Editors: Unstructured, but not
really . . . . . . . . . . . . . . . . . 8--8
John Stanik News 2.0: OSx86 for the Masses?; OS? We
Don't Need No Stinkin' OS; Real Crime
Descends upon Virtual World . . . . . . 10--10
Charlene O'Hanlon What's on your hard drive? . . . . . . . 12--12
George Neville-Neil Kode Vicious: Kode Vicious unscripted 14--16
Daniela Florescu Managing semi-structured data . . . . . 18--24
Adam Bosworth Learning from the Web . . . . . . . . . 26--32
C. M. Sperberg-McQueen XML $<$ and semi-structured data$>$ . . . 34--41
Natalya Noy Order from chaos . . . . . . . . . . . . 42--49
Alon Halevy Why your data won't mix . . . . . . . . 50--58
J. S. Edwards Review of ``Slamming Spam: A Guide for
System Administrators'' by Robert
Haskins and Dale Nielsen, Addison-Wesley
Professional, 2004, \$44.99 ISBN
0-13-146716-6} . . . . . . . . . . . . . 60--60
Neil Karl Review of ``Official Eclipse 3.0 FAQs''
by John Arthorne and Chris Laffra,
Addison-Wesley Professional, 2004,
\$34.99 ISBN 0-321-26838-5} . . . . . . 60--60
Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 61--61
Chris Suver Curmudgeon: The cost of data . . . . . . 64, 62--63
Charlene O'Hanlon From the editors: Socially acceptable
behavior . . . . . . . . . . . . . . . . 8--8
John Stanik News 2.0: Acoustical Spying Techniques
Cooked up in the Lab; .ODF Delivers
Crushing Blow to .DOC;
Wikibooks---Coming to a Classroom Near
You? . . . . . . . . . . . . . . . . . . 10--10
Charlene O'Hanlon What's on your hard drive? . . . . . . . 12--12
George Neville-Neil Kode Vicious: The Doctor is In . . . . . 14--16
Charlene O'Hanlon Interview: a conversation with Ray Ozzie 18--26
David Millen and
Jonathan Feinberg and
Bernard Kerr Social bookmarking in the enterprise . . 28--35
Vipul Ved Prakash and
Adam O'Donnell Fighting spam with reputation systems 36--41
Andreas Gustafsson Threads without the pain . . . . . . . . 42--47
Andrew McCallum Information extraction: distilling
structured data from unstructured text 48--57
Fernando Berzal Review of ``Working Effectively with
Legacy Code'', by Michael Feathers,
Prentice Hall PTR, 2004, \$44.99 ISBN
0-13-117705-2} . . . . . . . . . . . . . 58--58
G. K. Jenkins Review of ``The Linux Enterprise
Cluster'', by Karl Kopper, No Starch
Press, 2005, \$49.95 ISBN 1-59327-036-4} 58--58
Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 60--60
David Patterson Curmudgeon: Stop whining about
outsourcing! . . . . . . . . . . . . . . 64, 63
Charlene O'Hanlon From the editors: In with the new . . . 8--8
John Stanik News 2.0: Web 2.0---Looking Toward the
Future or Reviving the Past?; Easy Come,
Easy Splog; Carpal Tunnel Is So
Nineties! . . . . . . . . . . . . . . . 10--10
Charlene O'Hanlon What's on your hard drive? . . . . . . . 11--11
George Neville-Neil Kode Vicious: Vicious XSS . . . . . . . 12--15
Charlene O'Hanlon Interview: a conversation with Phil
Smoot . . . . . . . . . . . . . . . . . 16--24
Daniel Rogers Lessons from the floor . . . . . . . . . 26--32
Bill Hoffman Monitoring, at your service . . . . . . 34--43
Friedrich Steimann and
Thomas Kühne Coding for the code . . . . . . . . . . 44--51
A. K. Menon Review of ``Open Systems and Standards
for Software Product Development'' by P.
A. Dargan, Artech House, 2005, \$89.00,
ISBN 1-58053-749-9} . . . . . . . . . . 52--52
Andreas Tomek Review of ``Intrusion Prevention and
Active Response: Deploying Network and
Host IPS'' by Michael Rash, Angela D.
Orebaugh, Graham Clark, Becky Pinkard,
and Jake Babbin, Syngress Publishing,
2005, \$49.99, ISBN 1-932266-47-X} . . . 52--52
Stan Kelly-Bootle Curmudgeon: Anything Su Doku, I can do
better . . . . . . . . . . . . . . . . . 56, 54
Charlene O'Hanlon From the editors: Quality really is job
#1 . . . . . . . . . . . . . . . . . . . 8--8
John Stanik News 2.0: IPv6 Gains Government
Traction; Search-as-a-Service Gets
Serious; When Detecting Life, Is
Biometrics All Thumbs? . . . . . . . . . 10--10
Charlene O'Hanlon What's on your hard drive? . . . . . . . 11--11
George Neville-Neil Kode Vicious: Gettin' your kode on . . . 12--14
Charlene O'Hanlon Interview: a conversation with Jarod
Jenson . . . . . . . . . . . . . . . . . 16--24
Bryan Cantrill Hidden in plain sight . . . . . . . . . 26--36
Philip Beevers A high-performance team . . . . . . . . 38--43
Bart Smaalders Performance anti-patterns . . . . . . . 44--50
Mark Purdy Modern Performance Monitoring . . . . . 48--57
Arthur Gittleman Review of ``Foundations of Ajax'' by
Ryan Asleson and Nathaniel Schutta,
APress, 2005, \$39.99, ISBN
1-59059-582-3} . . . . . . . . . . . . . 62--62
Radu State Review of ``Switching to VoIP'' by Ted
Wallingford, O'Reilly & Associates, 2005,
\$39.95, ISBN 0-596-00868-6} . . . . . . 62--62
Phillip Laplante Curmudgeon: It isn't your father's
realtime anymore . . . . . . . . . . . . 64, 63
Nicholas Roeder and
Martin Wheatman Letters: Questioning MDD; The Economics
of Outsourcing . . . . . . . . . . . . . 7--7
John Stanik News 2.0: Symantec's Semantics; Spyware
Defined---For Now; More over Spyware,
There's Myware . . . . . . . . . . . . . 8--8
Charlene O'Hanlon Reader files: What's on your hard drive? 9--9
George Neville-Neil Kode Vicious: Human-KV interaction . . . 10--12
Charlene O'Hanlon Interview: a conversation with Steve
Ross-Talbot . . . . . . . . . . . . . . 14--23
Peter De Jong Q focus: Workflow systems: Going with
the flow . . . . . . . . . . . . . . . . 24--32
James Champy People and process . . . . . . . . . . . 34--38
Derek Miers Best practice (BPM) . . . . . . . . . . 40--48
Duncan Johnston-Watt Under new management . . . . . . . . . . 50--58
Elliot Jaffe Review of ``Pro Perl'' by Peter
Wainwright, Apress, 2005, \$59.99, ISBN
1-59059-438-X} . . . . . . . . . . . . . 59--59
Marc Paquette Review of ``Wiki: Web Collaboration'' by
Anja Ebersbach, Markus Glaser and
Richard Heigl, Springer, 2005, \$64.95,
ISBN 3-540-25995-3} . . . . . . . . . . 59--59
Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 60--61
Stan Kelly-Bootle Curmudgeon: But, having said that,
\ldots . . . . . . . . . . . . . . . . . 64, 63
Charlene O'Hanlon From the Editors: The private universe 7--7
John Stanik News 2.0: Attackers Set Sights on Macs;
Sneakernet Security; IT' Paradox . . . . 8--8
Charlene O'Hanlon What's on your hard drive? . . . . . . . 9--9
George Neville-Neil Kode Vicious: Kode Vicious bugs out . . 10--12
Charlene O'Hanlon Interview: a conversation with Chuck
McManis . . . . . . . . . . . . . . . . 13--21
Terry Coatta Q Focus: Purpose-Built Systems: The (not
so) hidden computer . . . . . . . . . . 22--26
Jim Barton TiVo-lution . . . . . . . . . . . . . . 28--35
Stephen Johnson Java in a teacup . . . . . . . . . . . . 36--41
Andrea Paramithiotti Review of ``Grid Database Design'' by
April Wells, Auerbach Publications,
2005, \$79.95, ISBN 0-8493-2800-4} . . . 42--42
Radu State Review of ``Extrusion Detection:
Security Monitoring for Internal
Intrusions'' by Richard Bejtlich,
Adddison-Wesley Professional, 2005,
\$49.99, ISBN 0-321-34996-2} . . . . . . 42--42
Mache Creeger Curmudgeon: Evolution or revolution? . . 56--ff
Charlene O'Hanlon From the editors: The domino effect . . 8--8
John Stanik News 2.0: Programmers at Play; Hunch
Engine Hones In; The Real Risks of RFID 9--9
Charlene O'Hanlon What's on your hard drive? . . . . . . . 10--11
George Neville-Neil Kode Vicious: Phishing for solutions . . 12--13
Charlene O'Hanlon Interview: a conversation with Werner
Vogels . . . . . . . . . . . . . . . . . 14--22
Jeff Barr and
Luis Felipe Cabrera AI gets a brain . . . . . . . . . . . . 24--29
Ryan Barrows and
Jim Traverso Search considered integral . . . . . . . 30--36
Taf Anthias and
Krishna Sankar The network's new role . . . . . . . . . 38--46
Andreas Tomek Review of ``Protect your Windows
Network: From Perimeter to Data by
Jesper Johansson and Steve Riely,''
Addison-Wesley Professional, 2005,
\$49.99, ISBN 0-321-33643-7} . . . . . . 42--42
Bernard Kuc Review of ``Open Source Wireless Java
Tools Suite by Robert Virkus,'' Apress,
2005, \$39.99, ISBN 1-59059-503-3} . . . 48--48
George Hacken Review of ``High-Assurance Design:
Architecting Secure and Reliable
Enterprise Applications by Clifford
Berg,'' Addison-Wesley Professional,
2005, \$54.99, ISBN 0-321-37577-7} . . . 50--50
Jose Lloret Review of ``Securing Storage: A
Practical Guide to SAN and NAS Security
by Himanshu Dwivedi,'' Addison-Wesley
Professional, 2005, \$49.99, ISBN
0-321-34995-4} . . . . . . . . . . . . . 50--50
Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 52--53
Stan Kelly-Bootle Curmudgeon: The calculus formally known
as pi . . . . . . . . . . . . . . . . . 56, 54--55
Charlene O'Hanlon From the editors: Accessorizing . . . . 6--6
John Stanik News 2.0: Measuring the Web's Mood;
Software Slump on the Mend? Mobile
Gaming for Hackers . . . . . . . . . . . 7--7
Charlene O'Hanlon What's on your hard drive? . . . . . . . 8--8
George Neville-Neil Kode Vicious: Logging on with KV . . . . 9--10
Charlene O'Hanlon Interview: a conversation with Leo Chang
of ClickShift . . . . . . . . . . . . . 12--18
Greg Olsen From COM to Common . . . . . . . . . . . 20--26
Michi Henning The rise and fall of CORBA . . . . . . . 28--34
Chris Richardson Untangling Enterprise Java . . . . . . . 36--44
Len Takeuchi ASPs: the integration challenge . . . . 46--52
Michael Laszlo Review of ``Component-Oriented
Programming by Andy Ju An Wang and Kai
Qian,'' Wiley-Interscience, 2005,
\$89.95, ISBN 0-471-64446-3} . . . . . . 59--59
A. Moreno Review of ``Agile Estimating and
Planning by Mike Cohn,'' Prentice Hall
PTR, 2005, \$44.99, ISBN 0-13-147941-5} 59--59
Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 60--61
Alex E. Bell Curmudgeon: Software development amidst
the whiz of silver bullets\ldots . . . . 64, 62--63
Charlene O'Hanlon From the editors: Able bodies . . . . . 8--8
John Stanik News 2.0: Carrying the Torch of
Anti-Spam Vigilantism; Taking
Constrained Programming to the Next
Level; The Human Intelligence Revolution 9--9
Charlene O'Hanlon What's on your hard drive? . . . . . . . 10--10
George Neville-Neil Kode Vicious: Pointless PKI . . . . . . 11--12
Charlene O'Hanlon Interview: a conversation with Jordan
Cohen . . . . . . . . . . . . . . . . . 14--23
John Canny The future of human-computer interaction 24--32
James L. Crowley Social perception . . . . . . . . . . . 34--43
Gaetano Borriello The invisible assistant . . . . . . . . 44--49
Jim Christensen and
Jeremy Sussman and
Stephen Levy and
William E. Bennett and
Tracee Vetting Wolf and
Wendy A. Kellogg Too much information . . . . . . . . . . 50--57
Bayard Kohlhepp Review of ``Windows and Linux
Integration: Hands-on Solutions for a
Mixed Environment by Jermy Moskowitz and
Thomas Boutell,'' Sybex Inc., 2005,
\$59.99, ISBN 0-7821-4428-4} . . . . . . 58--58
Melissa C. Stange Review of ``Pro .NET 1.1 Remoting,
Reflection, and Threading by David
Curran, Fabio Ferracchiati, Syed Gilani,
et al.,'' Apress, 2005, \$59.99, ISBN
1-59059-452-5} . . . . . . . . . . . . . 58--58
Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 59--59
Stan Kelly-Bootle Curmudgeon: Like a podcast in the sea:
mean ol' LoTech blues . . . . . . . . . 64, 62--63
Charlene O'Hanlon From the editors: Playing by the rules 8--8
Charlene O'Hanlon What's on your hard drive? . . . . . . . 10--10
John Stanik News 2.0: Open Source Gets Mac Attack;
Oh No, Not Another Consortium!; Get That
Chip out of My Drink . . . . . . . . . . 10--10
George Neville-Neil Kode vicious: Facing the strain . . . . 12--13
Mache Creeger \tt geek@home: Rationalizing a home
terabyte server . . . . . . . . . . . . 14--17
Eric Allman Complying with compliance . . . . . . . 18--21
George W. Beeler, Jr. and
Dana Gardner A requirements primer . . . . . . . . . 22--26
John Bostick Box their SOXes off . . . . . . . . . . 28--29
J. C. Cannon and
Marilee Byers Compliance deconstructed . . . . . . . . 30--37
Tracy Ragan Keeping score in the IT compliance game 38--43
Vladan Jovanovic Review of \em Refactoring Databases:
Evolutionary Database Design by Scott
Ambler and Pramodkumar Sadalage,
Addison-Wesley Professional, 2006,
\$49.99, ISBN 0-321-29353-3} . . . . . . 44--44
Radu State Review of \em Software Security:
Building Security In by Gary McGraw,
Addison-Wesley Professional, 2006,
\$49.99, ISBN 0-321-35670-5} . . . . . . 44--44
Greg A. Nolann Curmudgeon: Seeking compliance nirvana 72
Charlene O'Hanlon From the editors: Reality vs. perception 7--7
John Stanik News 2.0: The Mobile Linux Challenge;
Google not into Googling; Keeping Online
Video Legit . . . . . . . . . . . . . . 8--8
Charlene O'Hanlon Reader files: What's on your hard drive? 9--9
George Neville-Neil Kode vicious: Saddle up, aspiring code
jockeys . . . . . . . . . . . . . . . . 10--11
Charlene O'Hanlon Interview: a conversation with David
Brown . . . . . . . . . . . . . . . . . 14--23
John R. Mashey The long road to 64 bits . . . . . . . . 24--35
Dan Rubel The heart of eclipse . . . . . . . . . . 36--44
Damon Poole Breaking the major release habit . . . . 46--51
Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 52--52
Stan Kelly-Bootle Curmudgeon: You can look it up: or maybe
not . . . . . . . . . . . . . . . . . . 56, 54--55
Charlene O'Hanlon From the editors: The criminal mind . . 7--7
John Stanik News 2.0: Medical Profession Slow to
Embrace 'Net\ldots or Is It?;
Accessibility Features Not Just for the
Disabled; Emerging Markets Embrace
64-bit . . . . . . . . . . . . . . . . . 8--8
Charlene O'Hanlon Reader files: What's on your hard drive? 9--9
George Neville-Neil Kode vicious: Understanding the problem 10--12
Mache Creeger geek@home: Better health care through
technology . . . . . . . . . . . . . . . 13--15
Charlene O'Hanlon Interview: a conversation with Douglas
W. Jones and Peter G. Neumann . . . . . 16--23
Team Cymru Cybercrime: an epidemic . . . . . . . . 24--35
Eric Allman E-mail authentication: what, why, how? 30--34
Thomas Wadlow and
Vlad Gorelik Criminal code: the making of a
cybercriminal . . . . . . . . . . . . . 36--41
Daniel E. Geer Playing for keeps . . . . . . . . . . . 42--48
Radu State Review of ``Phishing Exposed'' by Lance
James and Joe Stewart, Syngress
Publishing, 2005, \$49.95, ISBN
1-59749-030-X} . . . . . . . . . . . . . 50--50
Markus Wolf Review of ``Spring in Action'' by Craig
Walls and Ryan Breidenbach, Manning
Publications, 2005, \$44.95, ISBN
1-932394-35-4} . . . . . . . . . . . . . 50--50
Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 52--52
Phillip A. Laplante Curmudgeon: The joy of spam . . . . . . 56, 54--55
Charlene O'Hanlon From the Editors: Forward thinking . . . 8--8
John Stanik News 2.0: Fox and the Weasel; Down on
the Wireless Farm; Second-Life Commerce
Meets First-Life IRS . . . . . . . . . . 10--10
Charlene O'Hanlon What's on your hard drive? . . . . . . . 11--11
George Neville-Neil Kode Vicious: Peerless P2P . . . . . . . 12--13
Charlene O'Hanlon Interview: a conversation with John
Hennessy and David Patterson . . . . . . 14--22
Ali-Reza Adl-Tabatabai and
Christos Kozyrakis and
Bratin Saha Unlocking concurrency . . . . . . . . . 24--33
Simon Crosby and
David Brown The virtualization reality . . . . . . . 34--41
Brian Carpenter Better, faster, more secure . . . . . . 42--48
D. Spinellis Review of `Sustainable Software
Development: An Agile Perspective' by
Kevin Tate, Addison-Wesley Professional,
2005, \$39.99, ISBN 0-321-28608-1} . . . 49--49
Radu State Review of `Hacking Exposed: Web
Applications', 2nd edition by Joel
Scambray, Mike Shema, and Caleb Sima,
McGraw-Hill Osborne Media, 2006,
\$49.99, ISBN 0-07-226299-0} . . . . . . 49--49
Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 50--50
Stan Kelly-Bootle Curmudgeon: Will the real bots stand up? 56, 52--55
John Stanik News 2.0: Malware --- Quantity over
Quality; The Home Robotics Revolution;
Roboexotica . . . . . . . . . . . . . . 8--8
John Stanik What's on your hard drive? . . . . . . . 10--10
George Neville-Neil Kode vicious: a license to kode . . . . 12--14
John Stanik Interview: a conversation with Jamie
Butler . . . . . . . . . . . . . . . . . 16--23
Vlad Gorelik One step ahead . . . . . . . . . . . . . 24--31
Richard Ford Open vs. closed: which source is more
secure? . . . . . . . . . . . . . . . . 32--38
David F. Bacon Realtime garbage collection . . . . . . 40--49
Fernando Berzal Review of `Why Programs Fail: a Guide to
Systematic Debugging' by Andreas Zeller,
Morgan Kaufmann, 2005, \$54.95, ISBN
1-55860-866-4} . . . . . . . . . . . . . 50--50
Jeffrey Putnam Review of `Model Driven Architecture and
Ontology Development' by Dragan
Ga\vsevi\'c, Dragan Djuri\'c, and Vladan
Devedzic, Springer, 2006, \$59.99, ISBN
3-540-32180-2} . . . . . . . . . . . . . 50--50
John Stanik Calendar . . . . . . . . . . . . . . . . 52--52
Alex Bell Curmudgeon: DOA with SOA . . . . . . . . 56--ff
John Stanik News 2.0: Googlebombs Away; DST: This
Year's Y2K?; Linux through Windows . . . 7--7
George Neville-Neil Kode vicious: APIs with an appetite . . 8--10
Mache Creeger Repurposing consumer hardware . . . . . 12--13
John Stanik Interview: a conversation with Cullen
Jennings and Doug Wadkins . . . . . . . 14--20
Robert Sparks SIP: basics and beyond . . . . . . . . . 22--33
David A. Bryan and
Bruce B. Lowekamp Decentralizing SIP . . . . . . . . . . . 34--41
Jason Fischl and
Hannes Tschofenig Making SIP make cents . . . . . . . . . 42--49
Martin J. Steinmann Unified communications with SIP . . . . 50--55
Shantanu Bhattacharya Review of `Essential Software
Architecture' by Ian Gorton,
Springer-Verlag New York Inc., Secaucus,
NJ, 2006, \$59.95, ISBN 3-540-28713-2} 56--56
Brian D. Goodman Review of `The Geek Gap: Why Business
and Technology Professionals Don't
Understand Each Other and Why They Need
Each Other to Survive' by Bill Pfleging
and Minda Zetlin, Prometheus Books,
2006, \$25.00, ISBN 1-59102-415-3} . . . 56--56
John Stanik Calendar . . . . . . . . . . . . . . . . 58--58
Stan Kelly-Bootle Curmudgeon: As big as a barn? . . . . . 64, 62--63
James Maurer From the Editors: Going forward . . . . 8--8
John Stanik News 2.0: Virtualization Reconsidered;
The Power of PS3; Anti-P2P Software
Targets Universities . . . . . . . . . . 10--10
George Neville-Neil Kode vicious: Advice to a newbie . . . . 12--14
John Stanik Interview: a conversation with Cory
Doctorow and Hal Stern . . . . . . . . . 16--23
Paul Vixie DNS complexity . . . . . . . . . . . . . 24--29
Daniel E. Geer The evolution of security . . . . . . . 30--35
Philip Papadopoulos and
Greg Bruno and
Mason Katz Beyond Beowulf clusters . . . . . . . . 36--43
S. Balaraman Review of `Pro JSF and Ajax: Building
Rich Internet Components' by Jonas
Jacobi and John Fallows, Apress, 2006,
\$49.99, ISBN 1-59059-580-7} . . . . . . 44--44
Radu State Review of `Embedded Linux Primer: A
Practical Real-world Approach' by
Christopher Hallinan, Prentice Hall PTR,
2006, \$44.99, ISBN 0-13-167984-8} . . . 44--44
John Stanik Calendar . . . . . . . . . . . . . . . . 46--46
Stan Kelly-Bootle Curmudgeon: Ode or code?: programmers be
used! . . . . . . . . . . . . . . . . . 52, 48--51
George V. Neville-Neil Kode vicious: KV the loudmouth . . . . . 8--10
Mache Creeger geek@home: Embracing wired networks . . 12--15
John Stanik Interview: a conversation with Michael
Stonebraker and Margo Seltzer . . . . . 16--23
Michi Henning API design matters . . . . . . . . . . . 24--36
Bob Toxen The seven deadly sins of Linux security 38--47
John O'Hara Toward a commodity enterprise middleware 48--55
Rafael Corchuelo Review of `Expert VB 2005 Business
Objects' (second edition) by Rockford
Lhotka, Apress, 2006, \$59.99, ISBN
1-59059-631-5} . . . . . . . . . . . . . 56--56
Will Wallace Review of `Designing with Web Standards'
(second edition) by Jeffrey Zeldman,
Peachpit Press, 2006, \$44.99, ISBN
0-321-38555-1} . . . . . . . . . . . . . 56--56
John Stanik Calendar . . . . . . . . . . . . . . . . 58--58
Stan Kelly-Bootle Curmudgeon: Alloneword . . . . . . . . . 64, 61--63
John Stanik Letters: Kudos to Curmudgeon; Long Live
the Wire . . . . . . . . . . . . . . . . 8--8
George V. Neville-Neil Kode vicious: Gettin' your head straight 9--10
John Stanik Interview: a conversation with Joel
Spolsky . . . . . . . . . . . . . . . . 12--20
George V. Neville-Neil Building secure Web applications . . . . 22--26
Naveen Agarwal and
Scott Renfro and
Arturo Bejar Phishing forbidden . . . . . . . . . . . 28--32
Vikram V. Ingleshwar Usability testing for the Web . . . . . 34--37
Philippe Kruchten Voyage in the agile memeplex . . . . . . 38--44
Shantanu Bhattacharya Review of `Enterprise Service-Oriented
Architectures: Concepts, Challenges,
Recommendations' by James McGovern,
Oliver Sims, Ashish Jain, and Mark
Little, Springer-Verlag, 2006, \$59.95,
ISBN 1-4020-3704-X} . . . . . . . . . . 46--46
Andrea Paramithiotti Review of `Hitchhiker's Guide to Visual
Studio and SQL Server: Best Practice
Architectures and Examples,' 7th edition
(Microsoft Windows Server System Series)
by William Vaugh and Peter Blackburn,
Addison-Wesley Professional, 2006,
\$59.99, ISBN 0-321-24362-5} . . . . . . 46--46
John Stanik Calendar . . . . . . . . . . . . . . . . 48--48
Stan Kelly-Bootle Curmudgeon: Some swans are black . . . . 52, 49--51
Alex Bell Opinion: Ground control to Architect Tom
\ldots . . . . . . . . . . . . . . . . . 8--10
George Neville-Neil Kode vicious: The next big thing . . . . 11--12
John Stanik Interview: a conversation with Jeff
Bonwick and Bill Moore . . . . . . . . . 13--19
Garth Goodson and
Sai Susharla and
Rahul Iyer Standardizing storage clusters . . . . . 20--27
Jon Elerath Hard disk drives: the good, the bad and
the ugly! . . . . . . . . . . . . . . . 28--37
Kostadis Roussos Storage virtualization gets smart . . . 38--44
S. Balaraman Review of `Beginning POJOs: From Novice
to Professional' by Brian Sam-Bodden,
Apress, 2006, \$39.99, ISBN
1-59059-596-3} . . . . . . . . . . . . . 45--45
Diego R. Llanos Review of `Grid Computing Security' by
Anirban Chakrabarti, Springer, 2007,
\$69.96, ISBN 3-540-44492-0} . . . . . . 45--45
John Stanik Calendar . . . . . . . . . . . . . . . . 46--46
Stan Kelly-Bootle Curmudgeon: The code delusion . . . . . 52, 49--51
George V. Neville-Neil Kode vicious: Take a freaking
measurement! . . . . . . . . . . . . . . 7--8
John Stanik Interview: a conversation with Mary Lou
Jepsen . . . . . . . . . . . . . . . . . 9--15
Matthew Garrett Powering down . . . . . . . . . . . . . 16--21
Simson L. Garfinkel Document & media exploitation . . . . . . 22--30
David Sohn Understanding DRM . . . . . . . . . . . 32--39
Mark Callow and
Paul Beardow and
David Brittain Big games, small screens . . . . . . . . 40--50
Marc S. Gibian Review of `Practical Subversion', Second
Edition, by Daniel Berlin and Garrett
Rooney, Apress, 2006, \$34.99, ISBN
1-59059-753-2} . . . . . . . . . . . . . 51--51
O. Lecarme Review of `Pro Drupal Development', by
John VanDyk and Matt Westgate, Apress
2007, \$44.99, ISBN 1-59059-755-9} . . . 51--51
John Stanik Calendar . . . . . . . . . . . . . . . . 52--52
Stan Kelly-Bootle Curmudgeon: Use it or lose it . . . . . 56, 53--55
George Neville-Neil Kode vicious: Poisonous programmers . . 5--6
John Stanik Interview: a conversation with Jason
Hoffman . . . . . . . . . . . . . . . . 7--13
Tom Killalea Meet the virts . . . . . . . . . . . . . 14--18
Werner Vogels Beyond server consolidation . . . . . . 20--26
Ulrich Drepper The cost of virtualization . . . . . . . 28--35
Scot Rixner Network virtualization: breaking the
performance barrier . . . . . . . . . . 36--ff
Peter Kriens How OSGi changed my life . . . . . . . . 44--51
Stan Kelly-Bootle Curmudgeon: All things being equal? . . 56, 54--55
James Maurer From the Editors: Going digital . . . . 7--7
George Neville-Neil Kode vicious: Latency and livelocks . . 8--10
John Stanik Interview: a conversation with Kurt
Akeley and Pat Hanrahan . . . . . . . . 11--17
Kayvon Fatahalian and
Mike Houston GPUs: a closer look . . . . . . . . . . 18--28
Chas. Boyd Data-parallel computing . . . . . . . . 30--39
John Nickolls and
Ian Buck and
Michael Garland and
Kevin Skadron Scalable parallel programming with CUDA 40--53
William Mark Future graphics architectures . . . . . 54--64
Jose M. Ramirez Review of `Enterprise Ajax: Strategies
for Building High-performance Web
Applications' by David Johnson, Alexei
White, and Andre Charland, Prentice Hall
PTR, 2008, \$39.99, ISBN 0-13-224206-0} 66--66
Howard Whitston Review of `Essential RenderMan' by Ian
Stephenson, Springer-Verlag New York,
Inc., 2008, \$39.95, ISBN 1-84628-344-2} 66--66
John Stanik Calendar . . . . . . . . . . . . . . . . 68--68
Stan Kelly-Bootle Curmudgeon: Solomon's sword beats
Occam's razor . . . . . . . . . . . . . 72, 69--71
James Maurer From the editors: a New Era . . . . . . 7--7
George Neville-Neil Kode vicious: The Virtue of Paranoia . . 7--8
Terry Coatta Interview: a conversation with Erik
Meijer and Jose Blakeley . . . . . . . . 9--15
Craig Russell Bridging the Object-Relational Divide 18--28
Chris Richardson ORM in Dynamic Languages . . . . . . . . 28--37
Michael Keith and
Randy Stafford Exposing the Cache ORM . . . . . . . . . 38--47
Dan Pritchett BASE: An ACID Alternative . . . . . . . 48--55
Eric Allman A Tribute to Jim Gray . . . . . . . . . 56--57
Donna Carnes Ode to a Sailor . . . . . . . . . . . . 58--62
Jim Gray Distributed Computing Economics . . . . 63--68
Harry J. Foxwell Review of `The Definitive Guide to the
Xen Hypervisor' (Prentice Hall Open
Source Software Development Series),
David Chisnall, Prentice Hall PTR, 2007,
\$49.99, ISBN 0-13-234971-X} . . . . . . 69--69
Jeffrey Putnam Review of `Practical MythTV: Building a
PVR and Media Center PC', Stewart Smith
and Michael Still, Apress, 2007,
\$29.99, ISBN 1-59059-779-6} . . . . . . 69--69
Stan Kelly-Bootle Curmudgeon: There's a Lot of It About 72--ff
George Neville-Neil Kode vicious: Sizing your System . . . . 6--7
John Stanik Interview: a conversation with Steve
Bourne, Eric Allman, and Bryan Cantrill 8--15
Bryan Cantrill A Pioneer's Flash of Insight . . . . . . 16--17
Jim Gray and
Bob Fitzgerald Flash Disk Opportunity for Server
Applications . . . . . . . . . . . . . . 18--23
Adam Leventhal Flash Storage Today . . . . . . . . . . 24--30
Mark Moshayedi and
Patrick Wilkison Enterprise SSDs . . . . . . . . . . . . 32--39
Goetz Graefe The Five-minute Rule 20 Years Later: and
How Flash Memory Changes the Rules . . . 40--52
David B. Henderson Review of \em Botnet Detection:
Countering the Largest Security Threat
(Advances in Information Security) Wenke
Lee, Cliff Wang, David Dagon,
Springer-Verlag New York Inc., 2007,
\$99.00, ISBN: 0-387-68766-1} . . . . . 53--53
Annika Hinze Review of \em RailsSpace: Building a
Social Networking Website with Ruby on
Rails, (Addison-Wesley Professional Ruby
Series) Michael Hartl, Aurelius
Prochazka, Addison-Wesley Professional,
2007, \$44.99, ISBN 0-321-48079-1} . . . 53--53
John Stanik Calendar . . . . . . . . . . . . . . . . 54--54
Stan Kelly-Bootle Curmudgeon: The Fabrication of Reality 56--58
George Neville-Neil Kode vicious: Beautiful Code Exists, If
You Know Where to Look . . . . . . . . . 4--7
John Stanik Interview: a Conversation with Steve
Bourne, Eric Allman, and Bryan Cantrill 8--15
Bryan Cantrill and
Jeff Bonwick Real-world Concurrency . . . . . . . . . 16--25
Jim Larson Erlang for Concurrent Programming . . . 18--23
Ulrich Drepper Parallel Programming with Transactional
Memory . . . . . . . . . . . . . . . . . 38--45
Calin Cascaval and
Colin Blundell and
Maged Michael and
Harold W. Cain and
Peng Wu and
Stefanie Chiras and
Siddhartha Chatterjee Software Transactional Memory: why is it
only a research toy? . . . . . . . . . . 46--58
David G. Hill Review of \em Eating the IT Elephant:
Moving from Greenfield Development to
Brownfield (1st ed.), IBM Press, 2008,
\$29.99, ISBN 0-13-713012-0} . . . . . . 59--59
David Naugler Review of \em Pro WPF in C# 2008:
Windows Presentation Foundation with
.NET 3.5, (2nd ed.),' Apress, 2008,
\$54.99, ISBN 1-59059-955-1} . . . . . . 59--59
John Stanik Calendar . . . . . . . . . . . . . . . . 60--60
Stan Kelly-Bootle Curmudgeon: Affine Romance . . . . . . . 61--63
George Neville-Neil Kode vicious: Get Real about Realtime 6--9
Tom Killalea Building Scalable Web Services . . . . . 10--13
Werner Vogels Eventually Consistent . . . . . . . . . 14--19
Tom Leighton Improving Performance on the Internet 20--29
Steve Souders High Performance Web Sites . . . . . . . 30--37
Steve Bourne CTO Roundtable STORAGE . . . . . . . . . 38--45
Erik Wilde and
Robert J. Glushko XML Fever . . . . . . . . . . . . . . . 46--53
J. Miller Book Review: Practical API Design:
Confessions of a Java Framework
Architect (1st edition), Jaroslav
Tulach, Apress, 2008, \$74.99, ISBN:
978-1-4302-0973-7} . . . . . . . . . . . 54--54
Markus Wolf Book Review: Concurrent and Real-time
Programming in Ada (3rd edition), Alan
Burns, Andy Wellings, Cambridge
University Press, 2007, \$75.00, ISBN:
978-0-521-86697-2} . . . . . . . . . . . 54--54
John Stanik Calendar . . . . . . . . . . . . . . . . 55--55
George Neville-Neil Debugging Devices . . . . . . . . . . . 6--9
Jim Waldo Scaling in Games & Virtual Worlds . . . . 10--16
Walker White and
Christoph Koch and
Johannes Gehrke and
Alan Demers Better Scripts, Better Games . . . . . . 18--25
George V. Neville-Neil Code Spelunking Redux . . . . . . . . . 26--33
Mache Creeger CTO roundtable storage: part two . . . . 34--40
David Bellin Review of \em The Rails Way by Obie
Fernandez, Addison-Wesley Professional,
2007, \$49.99, ISBN: 978-0-321-44561-2} 41--41
David Naugler Review of \em Pro LINQ Object Relational
Mapping in C# 2008 by Vijay Mehta,
Apress, 2008, \$49.99, ISBN:
978-1-59059-965-5} . . . . . . . . . . . 41--41
John Stanik Calendar . . . . . . . . . . . . . . . . 42--42
George V. Neville-Neil Kode vicious: Pride and Prejudice: (The
\em Vasa) . . . . . . . . . . . . . . . 6--7
John Stanik Interview: a Conversation with Van
Jacobson . . . . . . . . . . . . . . . . 8--16
Mike Shapiro Purpose-Built Languages . . . . . . . . 18--24
Mache Creeger CTO roundtable: Virtualization: Part One 26--35
Benjamin Boer The Obama Campaign: a Programmer's
Perspective . . . . . . . . . . . . . . 36--39
S. Balaraman Book review: Review of \em Pro Web 2.0
Application Development with GWT by Jeff
Dwyer, Apress, 2008, \$44.99, ISBN
978-1-59059-985-3} . . . . . . . . . . . 40--40
Alessandro Berni Review of \em Wireless Ad Hoc and Sensor
Networks (1st ed) by Houda Labiod, John
Wiley & Sons, Inc., 2008, \$165.00, ISBN
1-84821-003-5} . . . . . . . . . . . . . 40--40
John Stanik Calendar . . . . . . . . . . . . . . . . 41--41
Stan Kelly-Bootle Curmudgeon: The Flaws of Nature . . . . 42--45
Jeff Norwalk Making the Move to AJAX . . . . . . . . 1:1--1:??
Peter Christy Commentary: a Trip Without a Roadmap . . 2:1--2:??
Eric Schrock Debugging AJAX in Production . . . . . . 3:1--3:??
James Maurer Introducing \ldots \tt acmqueue . . . . 5--5
George V. Neville-Neil Kode Vicious: Don't be Typecast as a
Software Developer . . . . . . . . . . . 6--9
Bryan Cantrill Interview: a Conversation with Arthur
Whitney . . . . . . . . . . . . . . . . 12--13
Thomas Wadlow and
Vlad Gorelik Security in the Browser . . . . . . . . 40--41
Niels Provos and
Moheeb Abu Rajab and
Panayiotis Mavrommatis Cybercrime 2.0: When the Cloud Turns
Dark . . . . . . . . . . . . . . . . . . 46--47
Ian Foster and
Savas Parastatidis and
Paul Watson and
Mark McKeown How Do I Model State? Let Me Count the
Ways . . . . . . . . . . . . . . . . . . 54--55
Matt Zandstra and
Robert Martin Book Reviews: \em PHP Objects, Patterns,
and Practice (second edition), Matt
Zandstra, Apress, 2007, \$44.99, ISBN
1-59059-909-8}, {{\em Clean Code: A
Handbook of Agile Software
Craftsmanship}, Robert Martin, Prentice
Hall PTR, 2008, \$42.99, ISBN
0-13-235088-2 . . . . . . . . . . . . . 75--75
Anonymous Calendar . . . . . . . . . . . . . . . . 76--76
Charles Beeler and
Craig Partridge Opinion: All-Optical Computing and
All-Optical Networks are Dead . . . . . 10--11
Jonathan M. Smith Fighting Physics: a Tough Battle . . . . 20--21
Mike O'Dell Network Front-end Processors, Yet Again 28--29
George V. Neville-Neil Whither Sockets? . . . . . . . . . . . . 34--35
Stan Kelly-Bootle Curmudgeon: One Peut-Être, Two Peut-Être,
Three Peut-Être, More . . . . . . . . . . 77--80
Werner Vogels and
Greg Olsen and
Lew Tucker and
Greg Badros and
Geir Ramleth and
Steve Bourne CTO roundtable: Cloud Computing . . . . 1:1--1:18
Mache Creeger Cloud Computing: An Overview: Part Two 2:1--2:??
Charles Reis and
Adam Barth and
Carlos Pizano Browser Security: Lessons from Google
Chrome . . . . . . . . . . . . . . . . . 3:1--3:8
Adam Jacobs The Pathologies of Big Data . . . . . . 1:1--1:10
Marshall Kirk McKusick and
Sean Quinlan Case Study: GFS: Evolution on
Fast-forward . . . . . . . . . . . . . . 10
Whitfield Diffie and
Susan Landau Communications Surveillance: Privacy and
Security at Risk . . . . . . . . . . . . 10
Pat Hanrahan A Conversation with David Shaw . . . . . 20--21
Pat Hanrahan A Conversation with David Shaw --- Audio
Clip . . . . . . . . . . . . . . . . . . ??
Jim Waldo and
Alan Ramos and
Weina Scott and
William Scott and
Doug Lloyd and
Katherine O'Leary A Threat Analysis of RFID Passports . . 10
Matthew T. Dougherty and
Michael J. Folk and
Erez Zadok and
Herbert J. Bernstein and
Frances C. Bernstein and
Kevin W. Eliceiri and
Werner Benger and
Christoph Best Unifying Biological Image Formats with
HDF5 . . . . . . . . . . . . . . . . . . 20
James C. Phillips and
John E. Stone Probing Biomolecular Machines with
Graphics Processors . . . . . . . . . . 30
Samantha Kleinberg and
Bud Mishra Metamorphosis: the Coming Transformation
of Translational Systems Biology . . . . 40
Paul Stachour and
David Collier-Brown You Don't Know Jack About Software
Maintenance . . . . . . . . . . . . . . 50
George Neville-Neil Kode Vicious: Merge Early, Merge Often 60--62
Paul Vixie What DNS Is Not . . . . . . . . . . . . 10
Stephen Petschulat Other People's Data . . . . . . . . . . 20
Alexandra Fedorova and
Juan Carlos Saez and
Daniel Shelepov and
Manuel Prieto Maximizing Power Efficiency with
Asymmetric Multicore Systems . . . . . . 30
Stan Kelly-Bootle Curmudgeon: Some Rules and Restrictions
May Apply . . . . . . . . . . . . . . . 1--3
Julian Hyde Data in Flight . . . . . . . . . . . . . 20
Adam Leventhal Triple-Parity RAID and Beyond . . . . . 30
George Neville-Neil Kode Vicious: Standards Advice . . . . . 40--43
Eric Saxe Power-Efficient Software . . . . . . . . 10
David Brown Interview: a Conversation with Steve
Furber . . . . . . . . . . . . . . . . . 1--8
George Neville-Neil Kode Vicious: Commitment Issues . . . . 20--22
David J. Brown and
Charles Reams Toward Energy-Efficient Computing . . . 30
Mache Creeger CTO Roundtable: Malware Defense . . . . 40
Andy Woods Cooling the Data Center . . . . . . . . 10
George Neville-Neil Kode Vicious: Broken Builds . . . . . . 20
Anonymous A Conversation with Jeff Heer, Martin
Wattenberg, and Fernanda Viégas . . . . . 1--8
Peter Phillips Enhanced Debugging with Traces . . . . . 1--6
George Phillips Simplicity Betrayed . . . . . . . . . . 10
Dave Durkee Why Cloud Computing Will Never Be Free 1--10
Julien Ridoux and
Darryl Veitch Principles of Robust Timing over the
Internet . . . . . . . . . . . . . . . . 1--14
Jeffrey Heer and
Michael Bostock and
Vadim Ogievetsky A Tour through the Visualization Zoo . . 40
George Neville-Neil Kode Vicious: Avoiding Obsolescence . . 50
Dustin Owens Securing Elasticity in the Cloud . . . . 1--7
Jeffrey Heer and
Michael Bostock and
Vadim Ogievetsky A Tour through the Visualization Zoo . . 20
Brendan Gregg Visualizing System Latency . . . . . . . 30
George Neville-Neil Kode Vicious: Collecting Counters . . . 10
Poul-Henning Kamp You're Doing It Wrong . . . . . . . . . 20
Eugene Loh The Ideal HPC Programming Language . . . 30
Robert DeLine and
Gina Venolia and
Kael Rowan Software Development with Code Maps . . 10
Mache Creeger Moving to the Edge: An ACM CTO
Roundtable on Network Virtualization . . 20
George V. Neville-Neil Lessons from the Letter . . . . . . . . 30
Mache Creeger Moving to the Edge: CTO Roundtable
Overview . . . . . . . . . . . . . . . . 40
Steve Chessin Injecting Errors for Fun and Profit . . 10
Stephen V. Cantrill Computers in Patient Care: The Promise
and the Challenge . . . . . . . . . . . 20
George Neville-Neil Kode Vicious: a Paucity of Ports . . . . 30
Cary Millsap Thinking Clearly about Performance . . . 1--10
Clem Cole and
Russell Williams Photoshop Scalability: Keeping It Simple 20
Kevin Montagne Tackling Architectural Complexity with
Modeling . . . . . . . . . . . . . . . . 30
Stan Kelly-Bootle Curmudgeon: Facing an Uncertain Past . . 40
David S. H. Rosenthal Keeping Bits Safe: How Hard Can It Be? 1--10
Mache Creeger The Theft of Business Innovation: An
ACM--BCS Roundtable on Threats to Global
Competitiveness . . . . . . . . . . . . 10
Mache Creeger The Theft of Business Innovation:
Overview . . . . . . . . . . . . . . . . 20
Mache Creeger A Conversation with Ed Catmull . . . . . 30
Evangelos Kotsovinos Virtualization: Blessing or Curse? . . . 40
Terry Coatta and
Julian Gosper UX Design and Agile: a Natural Fit? . . 50
Eben M. Haber and
Eser Kandogan and
Paul Maglio Collaboration in System Administration 10
George V. Neville-Neil Bound by the Speed of Light . . . . . . 20
Thomas A. Limoncelli A Plea to Software Vendors from
Sysadmins --- 10 Do's and Don'ts . . . . 30
Christina Lear System Administration Soft Skills . . . 10
Stan Kelly-Bootle Two Books Alike in Dignity . . . . . . . 10
Poul-Henning Kamp B.Y.O.C. (1,342 Times and Counting) . . 20
Jonathan Parri and
Daniel Shapiro and
Miodrag Bolic and
Voicu Groza Returning Control to the Programmer:
SIMD Intrinsics for Virtual Machines . . 30
George Neville-Neil Porting with Autotools . . . . . . . . . 10
Anonymous Jim Gray --- A Talk with THE SQL Guru
and Architect . . . . . . . . . . . . . 40
Poul-Henning Kamp The One-second War (What Time Will You
Die?) . . . . . . . . . . . . . . . . . 10
Andre Charland and
Brian LeRoux Mobile Application Development: Web vs.
Native . . . . . . . . . . . . . . . . . 20
Michael Rys Scalable SQL . . . . . . . . . . . . . . 30
George Neville-Neil Storage Strife . . . . . . . . . . . . . 10
Roberto Ierusalimschy and
Luiz Henrique de Figueiredo and
Waldemar Celes Passing a Language through the Eye of a
Needle . . . . . . . . . . . . . . . . . 20
David Rosenthal Deduplicating Devices Considered Harmful 30
Debasish Ghosh DSL for the Uninitiated . . . . . . . . 10
Oren Eini The Pain of Implementing LINQ Providers 10
Mache Creeger ACM CTO Roundtable on Mobile Devices in
the Enterprise . . . . . . . . . . . . . 10
Mache Creeger Mobile Devices in the Enterprise: CTO
Roundtable Overview . . . . . . . . . . 20
George Neville-Neil How to Improve Security? . . . . . . . . 30
Poul-Henning Kamp The Software Industry IS the Problem:
The time has come for software liability
laws . . . . . . . . . . . . . . . . . . 10
David Pacheco Postmortem Debugging in Dynamic
Environments . . . . . . . . . . . . . . 12
G. Bruce Berriman and
Steven L. Groom How Will Astronomy Archives Survive the
Data Tsunami? . . . . . . . . . . . . . 21
George Neville-Neil Wanton Acts of Debuggery . . . . . . . . 30
Robert Green and
Henry Ledgard Coding Guidelines: Finding the Art in
the Science . . . . . . . . . . . . . . 10
Vint Cerf and
Van Jacobson and
Nick Weaver and
Jim Gettys BufferBloat: What's Wrong with the
Internet? . . . . . . . . . . . . . . . 10
George Neville-Neil Code Rototilling . . . . . . . . . . . . 20
George V. Neville-Neil The Network Protocol Battle: a tale of
hubris and zealotry . . . . . . . . . . 10
Jim Gettys Home Bufferbloat Demonstration Videos 10
Eric Allman Managing Technical Debt . . . . . . . . 10
Andrew Danowitz and
Kyle Kelley and
James Mao and
John P. Stevenson and
Mark Horowitz CPU DB: Recording Microprocessor History 18
Dennis Abts and
Bob Felderman A Guided Tour through Data-Center
Networking . . . . . . . . . . . . . . . 10
George Neville-Neil A Nice Piece of Code . . . . . . . . . . 10
Manuel Serrano and
Gérard Berry Multitier Programming in Hop . . . . . . 10
George V. Neville-Neil Can More Code Mean Fewer Bugs? . . . . . 10
Marshall Kirk McKusick Disks from the Perspective of a File
System . . . . . . . . . . . . . . . . . 1--3
Michael Cornwell Anatomy of a Solid-State Drive . . . . . ??
Aiman Erbad and
Charles Krasic Sender-side Buffers and the Case for
Multimedia Adaptation . . . . . . . . . ??
George Neville-Neil Queue Portrait: Robert Watson . . . . . ??
Anonymous The Web Won't Be Safe or Secure until We
Break It . . . . . . . . . . . . . . . . ??
Anonymous Node Summit: The Importance of Cross
Platform . . . . . . . . . . . . . . . . ??
Arun Kumar and
Feng Niu and
Christopher Ré Hazy: Making it Easier to Build and
Maintain Big-data Analytics . . . . . . 1--17
Kate Matsudaira Making the Mobile Web Faster . . . . . . 1--9
George Neville-Neil Kode Vicious: Divided by Division . . . 1--3
Robert N. M. Watson A Decade of OS Access-control
Extensibility . . . . . . . . . . . . . 1--22
Brian Beckman and
Erik Meijer The Story of the Teapot in DHTML . . . . 1--10
Latanya Sweeney Discrimination in Online Ad Delivery . . 10
George Neville-Neil Kode Vicious: Cherry-picking and the
Scientific Method . . . . . . . . . . . 10
Terry Coatta Queue Portrait: Kate Matsudaira . . . . 10
George Neville-Neil Kode Vicious: The Naming of Hosts is a
Difficult Matter; Also, the perils of
premature rebooting . . . . . . . . . . 10
Poul-Henning Kamp More Encryption Is Not the Solution . . 10
George Neville-Neil Kode Vicious: A Lesson in Resource
Management . . . . . . . . . . . . . . . 10:10--10:12
Neil Mitchell Leaking Space . . . . . . . . . . . . . 1--14
George Neville-Neil Kode Vicious: Bugs and Bragging Rights 1--3
Alex E. Bell The Software Inferno . . . . . . . . . . 10
Nick Feamster and
Jennifer Rexford and
Ellen Zegura The Road to SDN . . . . . . . . . . . . ??
Zachary Hensley and
Jibonananda Sanyal and
Joshua New Provenance in Sensor Data Management . . ??
Anonymous Node at LinkedIn: The Pursuit of
Thinner, Lighter, Faster . . . . . . . . ??
George Neville-Neil Kode Vicious: This is the Foo Field . . ??
Poul-Henning Kamp Center Wheel for Success . . . . . . . . 10
Robert Sproull and
Jim Waldo The API Performance Contract . . . . . . 10
Andi Kleen Scaling Existing Lock-based Applications
with Lock Elision . . . . . . . . . . . 20
Wojciech Golab and
Muntasir R. Rahman and
Alvin AuYoung and
Kimberly Keeton and
Xiaozhou (Steve) Li Eventually Consistent: Not What You Were
Expecting? . . . . . . . . . . . . . . . 30
Paul Vixie Rate-limiting State . . . . . . . . . . 10
Ivar Jacobson and
Pan-Wei Ng and
Ian Spence and
Paul E. McMahon Major-league SEMAT: Why Should an
Executive Care? . . . . . . . . . . . . 20
George Neville-Neil Kode Vicious: The Logic of Logging . . . 30
Christoph Paasch and
Olivier Bonaventure Multipath TCP . . . . . . . . . . . . . 40
Erik Meijer Evolution of Javascript Revisited . . . 50
Erik Meijer Why Large Scale Mobile and E-Commerce
Apps use \tt Node.js . . . . . . . . . . 60
Eran Hammer Notes from the Battlefield (\tt Node.js
at Walmart) . . . . . . . . . . . . . . 70
Anonymous Release the Kraken: a Story of \tt
Node.js in the Enterprise (PayPal) . . . 80
Anonymous Riding the N(ode) Train (Groupon) . . . 90
Manish Vachharajani Embedding \tt Node.js into a
High-performance Network Datapath . . . 100
Anonymous \tt Node.js in the Digital Media
Universe . . . . . . . . . . . . . . . . 110
Lucian Carata and
Sherif Akoush and
Nikilesh Balakrishnan and
Thomas Bytheway and
Ripduman Sohan and
Margo Seltzer and
Andy Hopper A Primer on Provenance . . . . . . . . . 10
Poul-Henning Kamp Please Put OpenSSL Out of Its Misery . . 20
Wyatt Lloyd and
Michael J. Freedman and
Michael Kaminsky and
David G. Andersen Don't Settle for Eventual Consistency 30
Bob Toxen The NSA and Snowden: Securing the
All-Seeing Eye . . . . . . . . . . . . . 40
George Neville-Neil Kode Vicious: Forked Over . . . . . . . 10
Erik Meijer The Curse of the Excluded Middle . . . . 20
Andy Gill Domain-specific Languages and Code
Synthesis Using Haskell . . . . . . . . 30
Bo Joel Svensson and
Mary Sheeran and
Ryan Newton Design Exploration through
Code-generating DSLs . . . . . . . . . . 40
Mike Bland Finding More Than One Worm in the Apple 10
Terry Coatta and
Michael Donat and
Jafar Husain Automated QA Testing at EA: Driven by
Events . . . . . . . . . . . . . . . . . 20
Thomas Wadlow Who Must You Trust? . . . . . . . . . . 30
Poul-Henning Kamp The Bikeshed: Quality Software Costs
Money --- Heartbleed Was Free . . . . . 10
George Neville-Neil Kode Vicious: Outsourcing Responsibility 20
Michael J. Lutz and
J. Fernando Naveda and
James R. Vallino Undergraduate Software Engineering:
Addressing the Needs of Professional
Software Development . . . . . . . . . . 30
Mark Cavage and
David Pacheco Bringing Arbitrary Compute to
Authoritative Data . . . . . . . . . . . 40
Vinton G. Cerf ACM and the Professional Programmer . . 10
Peter Bailis and
Kyle Kingsbury The Network is Reliable . . . . . . . . 20
Jon P. Daries and
Justin Reich and
Jim Waldo and
Elise M. Young and
Jonathan Whittinghill and
Daniel Thomas Seaton and
Andrew Dean Ho and
Isaac Chuang Privacy, Anonymity, and Big Data in the
Social Sciences . . . . . . . . . . . . 30
Christoph Kern Securing the Tangled Web . . . . . . . . 40
Ben Laurie Certificate Transparency . . . . . . . . 10
Sharon Goldberg Why Is It Taking So Long to Secure
Internet Routing? . . . . . . . . . . . 20
Axel Arnbak and
Hadi Asghari and
Michel Van Eeten and
Nico Van Eijk Security Collapse in the HTTPS Market 30
George Neville-Neil Port Squatting . . . . . . . . . . . . . 10
Alex Liu JavaScript and the Netflix User
Interface . . . . . . . . . . . . . . . 20
John T. Richards and
Jonathan Brezin and
Calvin B. Swart and
Christine A. Halverson Productivity in Parallel Programming: a
Decade of Progress . . . . . . . . . . . 30
Ellen Chisa Evolution of the Product Manager . . . . 40
Erik Meijer and
Vikram Kapoor The Responsive Enterprise: Embracing the
Hacker Way . . . . . . . . . . . . . . . 10
David Chisnall There's No Such Thing as a
General-purpose Processor . . . . . . . 20
Ivar Jacobson and
Ed Seidewitz A New Software Engineering . . . . . . . 30
George Neville-Neil Too Big to Fail . . . . . . . . . . . . 10
Rick Richardson Disambiguating Databases . . . . . . . . 20
Geetanjali Sampemane Internal Access Controls . . . . . . . . 30
Davidlohr Bueso Scalability Techniques for Practical
Synchronization Primitives . . . . . . . 40
Poul-Henning Kamp HTTP\slash 2.0 --- The IETF is Phoning
It In . . . . . . . . . . . . . . . . . 10
Harlan Stenn Securing the Network Time Protocol . . . 20
Paul Vixie Go Static or Go Home . . . . . . . . . . 30
Robert V. Binder and
Bruno Legeard and
Anne Kramer Model-based Testing: Where Does It
Stand? . . . . . . . . . . . . . . . . . 40
Dave Long META II: Digital Vellum in the Digital
Scriptorium . . . . . . . . . . . . . . 50
Poul-Henning Kamp HTTP/2.0 --- The IETF is Phoning It In 10
George Neville-Neil Kode Vicious: Raw Networking . . . . . . 20
Paul Vixie Go Static or Go Home . . . . . . . . . . 30
Spencer Rathbun Parallel Processing with Promises . . . 10
Justin Sheehy There is No Now . . . . . . . . . . . . 20
\vSt\vepán Davidovi\vc and
Kavita Guliani Reliable Cron across the Planet . . . . 30
Erik Meijer and
Kevin Millikin and
Gilad Bracha Spicing Up Dart with Side Effects . . . 40
Daniel C. Wang From the EDVAC to WEBVACs . . . . . . . 10
Phelim Dowling and
Kevin McGrath Using Free and Open Source Tools to
Manage Software Quality . . . . . . . . 20
Kate Matsudaira The Science of Managing Data Science . . 30
Andrew Brook Evolution and Practice: Low-latency
Distributed Applications in Finance . . 40
George Neville-Neil Kode Vicious: Lazarus Code . . . . . . . 10
Neil Gunther and
Paul Puglia and
Kristofer Tomasette Hadoop Superlinear Scalability . . . . . 20
Rich Harris Dismantling the Barriers to Entry . . . 30
George Neville-Neil Kode Vicious: Hickory Dickory Doc: On
null encryption and automated
documentation . . . . . . . . . . . . . 10
Arie van Deursen Beyond Page Objects: Testing Web
Applications with State Objects . . . . 20
Spence Green and
Jeffrey Heer and
Christopher D. Manning Natural Language Translation at the
Intersection of AI and HCI . . . . . . . 30
Philip Maddox Testing a Distributed System . . . . . . 10
Thanumalayan Sankaranarayana Pillai and
Vijay Chidambaram and
Ramnatthan Alagappan and
Samer Al-Kiswany and
Andrea C. Arpaci-Dusseau and
Remzi H. Arpaci-Dusseau Crash Consistency . . . . . . . . . . . 20
George Neville-Neil and
Steve Bourne Version Status: Still Finding the Right
Questions . . . . . . . . . . . . . . . 10
Tyler McMullen It Probably Works . . . . . . . . . . . 15
Olivia Angiuli and
Joe Blitzstein and
Jim Waldo How to De-identify Your Data . . . . . . 20
Ben Maurer Fail at Scale . . . . . . . . . . . . . 30
Kate Matsudaira Lean Software Development --- Building
and Shipping Two Versions . . . . . . . 40
Thomas A. Limoncelli Automation Should Be Like Iron Man, Not
Ultron . . . . . . . . . . . . . . . . . 50
Taylor Savage Componentizing the Web . . . . . . . . . 60
Fabien Gaud and
Baptiste Lepers and
Justin Funston and
Mohammad Dashti and
Alexandra Fedorova and
Vivien Quéma and
Renaud Lachaize and
Mark Roth Challenges of Memory Management on
Modern NUMA System . . . . . . . . . . . 70
George Neville-Neil Kode Vicious: Pickled Patches . . . . . 90
Amin Vahdat and
David Clark and
Jennifer Rexford A Purpose-built Global Network: Google's
Move to SDN . . . . . . . . . . . . . . 100
R. V. Guha and
Dan Brickley and
Steve MacBeth Schema.org: Evolution of Structured Data
on the Web . . . . . . . . . . . . . . . 10
Mihir Nanavati and
Malte Schwarzkopf and
Jake Wires and
Andrew Warfield Non-volatile Storage . . . . . . . . . . 20
George Neville-Neil Time is an Illusion . . . . . . . . . . 30
Pat Helland Immutability Changes Everything . . . . 40
Nicholas Diakopoulos Accountability in Algorithmic
Decision-making . . . . . . . . . . . . 50
Caitie McCaffrey The Verification of a Distributed System 60
Thomas A. Limoncelli How Sysadmins Devalue Themselves . . . . 70
Kate Matsudaira The Paradox of Autonomy and Recognition 80
George Neville-Neil Code Hoarding . . . . . . . . . . . . . 90
Brendan Burns and
Brian Grant and
David Oppenheimer and
Eric Brewer and
John Wilkes Borg, Omega, and Kubernetes . . . . . . 10
Heinrich Hartmann Statistics for Engineers . . . . . . . . 20
Poul-Henning Kamp More Encryption Means Less Privacy . . . 30
George Neville-Neil GNL is Not Linux . . . . . . . . . . . . 40
Ivar Jacobson and
Ian Spence and
Brian Kerr Use-Case 2.0 . . . . . . . . . . . . . . 50
Carlos Baquero and
Nuno Preguiça Why Logical Clocks are Easy . . . . . . 60
Kate Matsudaira Delegation as Art . . . . . . . . . . . 70
Brendan Gregg The Flame Graph . . . . . . . . . . . . 10
George Neville-Neil What Are You Trying to Pull? . . . . . . 20
Sachin Date Should You Upload or Ship Big Data to
the Cloud? . . . . . . . . . . . . . . . 30
Kate Matsudaira Nine Things I Didn't Know I Would Learn
Being an Engineer Manager . . . . . . . 40
Ivan Beschastnikh and
Patty Wang and
Yuriy Brun and
Michael D. and
Ernst Debugging Distributed Systems . . . . . 50
Thomas A. Limoncelli The Small Batches Principle . . . . . . 60
Peter Bailis and
Justine Sherry and
Simon Peter Introducing Research for Practice . . . 70
Pat Helland Standing on Distributed Shoulders of
Giants . . . . . . . . . . . . . . . . . 80
Tom Killalea The Hidden Dividends of Microservices 10
George Neville-Neil Chilling the Messenger . . . . . . . . . 20
Satnam Singh Cluster-level Logging of Containers with
Containers . . . . . . . . . . . . . . . 30
Peter Bailis and
Camille Fournier and
Joy Arulraj and
Andy Pavlo Research for Practice: Distributed
Consensus and Implications of NVM on
Database Management Systems . . . . . . 40
Andre Medeiros Dynamics of Change: Why Reactivity
Matters . . . . . . . . . . . . . . . . 50
Kate Matsudaira Bad Software Architecture is a People
Problem . . . . . . . . . . . . . . . . 60
Ulan Degenbaev and
Jochen Eisinger and
Manfred Ernst and
Ross McIlroy and
Hannes Payer Idle-Time Garbage-Collection Scheduling 70
Pat Helland The Singular Success of SQL . . . . . . 80
Thomas A. Limoncelli 10 Optimizations on Linear Search . . . 10
Adam Morrison Scaling Synchronization in Multicore
Programs . . . . . . . . . . . . . . . . 20
George Neville-Neil Cloud Calipers . . . . . . . . . . . . . 30
Pete Hunt and
Paul O'Shannessy and
Dave Smith and
Terry Coatta React: Facebook's Functional Turn on
Writing JavaScript . . . . . . . . . . . 40
Kate Matsudaira Fresh Starts . . . . . . . . . . . . . . 50
Marius Eriksen Functional at Scale . . . . . . . . . . 60
Pat Helland The Power of Babble . . . . . . . . . . 70
Jean Yang and
Vijay Janapa Reddi and
Yuhao Zhu and
Peter Bailis Research for Practice: Web Security and
Mobile Web Computing . . . . . . . . . . 80
Ivar Jacobson and
Ian Spence and
Ed Seidewitz Industrial Scale Agile --- from Craft to
Engineering . . . . . . . . . . . . . . 10
George Neville-Neil The Unholy Trinity of Software
Development . . . . . . . . . . . . . . 20
Josh Bailey and
Stephen Stuart Faucet: Deploying SDN in the Enterprise 30
Kate Matsudaira Resolving Conflict . . . . . . . . . . . 40
Neal Cardwell and
Yuchung Cheng and
C. Stephen Gunn and
Soheil Hassas Yeganeh and
Van Jacobson BBR: Congestion-Based Congestion Control 50
Irene Zhang and
Fadel Adib and
Peter Bailis Research for Practice: Distributed
Transactions and Networks as Physical
Sensors . . . . . . . . . . . . . . . . 60
Pat Helland Life Beyond Distributed Transactions . . 70
Thomas A. Limoncelli Are You Load Balancing Wrong? . . . . . 10
George Neville-Neil The Chess Player who Couldn't Pass the
Salt . . . . . . . . . . . . . . . . . . 20
Theo Schlossnagle Time, but Faster . . . . . . . . . . . . 30
Mohamed Zahran Heterogeneous Computing: Here to Stay 40
Robert C. Seacord Uninitialized Reads . . . . . . . . . . 50
Arvind Narayanan and
Andrew Miller and
Song Han and
Peter Bailis Research for Practice: Cryptocurrencies,
Blockchains, and Smart Contracts;
Hardware for Deep Learning . . . . . . . 60
Meng-Day (Mandel) Yu and
Srinivas Devadas Pervasive, Dynamic Authentication of
Physical Items . . . . . . . . . . . . . 70
Erik Meijer Making Money Using Math . . . . . . . . 10
Kate Matsudaira Does Anybody Listen to You? . . . . . . 20
Robert Guo MongoDB's JavaScript Fuzzer . . . . . . 30
George Neville-Neil Forced Exception-Handling . . . . . . . 40
Devon H. O'Dell The Debugging Mindset . . . . . . . . . 50
Peter Alvaro and
Sumit Galwani and
Peter Bailis Research for Practice: Tracing and
Debugging Distributed Systems;
Programming by Examples . . . . . . . . 60
Pat Helland and
Simon Weaver and
Ed Harris Too Big NOT to Fail . . . . . . . . . . 70
George Neville-Neil The Observer Effect . . . . . . . . . . 10
Mark A. Overton The IDAR Graph . . . . . . . . . . . . . 20
Kate Matsudaira Conversations with Technology Leaders:
Erik Meijer . . . . . . . . . . . . . . 30
Benjamin Treynor Sloss and
Mike Dahlin and
Vivek Rau and
Betsy Beyer The Calculus of Service Availability . . 40
Pat Helland Side Effects, Front and Center! . . . . 50
Graham Cormode Data Sketching . . . . . . . . . . . . . 60
Tawanna Dillahunt and
Stefanie Mueller and
Patrick Baudisch and
Peter Bailis Research for Practice: Technology for
Underserved Communities; Personal
Fabrication . . . . . . . . . . . . . . 70
George Neville-Neil IoT: The Internet of Terror . . . . . . 10
Ivar Jacobson and
Ian Spence and
Pan-Wei Ng Is There a Single Method for the
Internet of Things? . . . . . . . . . . 20
Kate Matsudaira 10 Ways to Be a Better Interviewer . . . 30
Alvaro Videla Metaphors We Compute By . . . . . . . . 40
Thomas A. Limoncelli Four Ways to Make CS&IT Curricula More
Immersive . . . . . . . . . . . . . . . 50
Edward Steel and
Yanik Berube and
Jonas Bonér and
Ken Britton and
Terry Coatta Hootsuite: In Pursuit of Reactive
Systems . . . . . . . . . . . . . . . . 60
John Regehr and
Peter Bailis Vigorous Public Debates in Academic
Computer Science . . . . . . . . . . . . 70
George Neville-Neil Cold, Hard Cache . . . . . . . . . . . . 10
Arvind Narayanan and
Jeremy Clark Bitcoin's Academic Pedigree . . . . . . 20
Jacob Loveless Cache Me If You Can . . . . . . . . . . 30
Kate Matsudaira Breadth and Depth . . . . . . . . . . . 40
Pat Helland XML and JSON Are Like Cardboard . . . . 50
Antony Alappatt Network Applications Are Interactive . . 60
Albert Kwon and
James Wilcox Private Online Communication; Highlights
in Systems Verification . . . . . . . . 70
Peter Alvaro and
Severine Tymon Abstracting the Geniuses Away from
Failure Testing . . . . . . . . . . . . 10
Kate Matsudaira Views from the Top . . . . . . . . . . . 20
Andrew Leung and
Andrew Spyker and
Tim Bozarth Titus: Introducing Containers to the
Netflix Cloud . . . . . . . . . . . . . 30
George Neville-Neil Reducing the Attack Surface . . . . . . 40
Yonatan Sompolinsky and
Aviv Zohar Bitcoin's Underlying Incentives . . . . 50:29--50:52
Thomas A. Limoncelli Operational Excellence in April Fools'
Pranks . . . . . . . . . . . . . . . . . 60
Malte Schwarzkopf Cluster Scheduling for Data Centers . . 70
Theo Schlossnagle Monitoring in a DevOps World . . . . . . 10
George Neville-Neil Popping Kernels . . . . . . . . . . . . 20
Nicole Forsgren and
Mik Kersten DevOps Metrics . . . . . . . . . . . . . 30
Kate Matsudaira How Is Your Week Going So Far? . . . . . 40
Bridget Kromhout Containers Will Not Fix Your Broken
Culture (and Other Hard Truths) . . . . 50
Deepak Vasisht Toward a Network of Connected Things . . 60
Jez Humble Continuous Delivery Sounds Great, but
Will It Work Here? . . . . . . . . . . . 70
\vSt\vepán Davidovi\vc and
Betsy Beyer Canary Analysis Service . . . . . . . . 10
Thomas A. Limoncelli Manual Work is a Bug . . . . . . . . . . 20
Diptanu Gon Choudhury and
Timothy Perrett Designing Cluster Schedulers for
Internet-Scale Services . . . . . . . . 30
Kate Matsudaira How to Come up with Great Ideas . . . . 40
Tobias Lauinger and
Abdelberi Chaabane and
Christo Wilson Thou Shalt Not Depend on Me . . . . . . 50
George Neville-Neil Watchdogs vs. Snowflakes . . . . . . . . 60
Dan Crankshaw and
Joseph Gonzalez Prediction-Serving Systems . . . . . . . 70
David Chisnall C Is Not a Low-level Language . . . . . 10
George Neville-Neil Every Silver Lining Has a Cloud . . . . 20
Alex Petrov Algorithms Behind Modern Storage Systems 30
Pat Helland Consistently Eventual . . . . . . . . . 40
Noor Mubeen Workload Frequency Scaling Law ---
Derivation and Verification . . . . . . 50
Gustavo Alonso FPGAs in Data Centers . . . . . . . . . 60
Pat Helland Mind Your State for Your State of Mind 10
Thomas A. Limoncelli GitOps: a Path to More Self-service IT 20
Zachary C. Lipton The Mythos of Model Interpretability . . 30
Kate Matsudaira The Secret Formula for Choosing the
Right Next Role . . . . . . . . . . . . 40
Alex Ratner and
Christopher Ré Knowledge Base Construction in the
Machine-learning Era . . . . . . . . . . 50
Matt Fata and
Philippe-Joseph Arida and
Patrick Hahn and
Betsy Beyer Corp to Cloud: Google's Virtual Desktops 60
George Neville-Neil The Obscene Coupling Known as Spaghetti
Code . . . . . . . . . . . . . . . . . . 70
Silvia Esparrachiari and
Tanya Reilly and
Ashleigh Rentz Tracking and Controlling Microservice
Dependencies . . . . . . . . . . . . . . 10
Kate Matsudaira How to Get Things Done When You Don't
Feel Like It . . . . . . . . . . . . . . 20
Rich Bennett and
Craig Callahan and
Stacy Jones and
Matt Levine and
Merrill Miller and
Andy Ozment How to Live in a Post-Meltdown and
-Spectre World . . . . . . . . . . . . . 30
Shylaja Nukala and
Vivek Rau Why SRE Documents Matter . . . . . . . . 40
George Neville-Neil A Chance Gardener . . . . . . . . . . . 50
Alpha Lam Using Remote Cache Service for Bazel . . 60
Richard L. Sites Benchmarking ``Hello, World!'' . . . . . 10
Jacek Czerwonka and
Michaela Greiler and
Christian Bird and
Lucas Panjer and
Terry Coatta CodeFlow: Improving the Code Review
Process at Microsoft . . . . . . . . . . 20
Kate Matsudaira The Importance of a Great Finish . . . . 30
George Neville-Neil Writing a Test Plan . . . . . . . . . . 40
Simson Garfinkel and
John M. Abowd and
Christian Martindale Understanding Database Reconstruction
Attacks on Public Data . . . . . . . . . 50
Thomas A. Limoncelli SQL is No Excuse to Avoid DevOps . . . . 60
Jessie Frazelle Security for the Modern Age . . . . . . 70
Ivar Jacobson and
Roly Stimson Tear Down the Method Prisons! Set Free
the Practices! . . . . . . . . . . . . . 80
Jim Waldo A Hitchhiker's Guide to the Blockchain
Universe . . . . . . . . . . . . . . . . 10
Kate Matsudaira Design Patterns for Managing Up . . . . 20
Benjamin Treynor Sloss and
Shylaja Nukala and
Vivek Rau Metrics That Matter . . . . . . . . . . 30
George Neville-Neil Know Your Algorithms . . . . . . . . . . 40
Raymond Blum and
Betsy Beyer Achieving Digital Permanence . . . . . . 50
Nitesh Mor Edge Computing . . . . . . . . . . . . . 60
Pat Helland Identity by Any Other Name . . . . . . . 70
Adrian Colyer SageDB and NetAccel . . . . . . . . . . 10
Aleksander Kuzmanovic Net Neutrality: Unexpected Solution to
Blockchain Scaling . . . . . . . . . . . 20
George Neville-Neil The Worst Idea of All Time . . . . . . . 30
Martin Kleppmann and
Alastair R. Beresford and
Boerge Svingen Online Event Processing . . . . . . . . 40
Kate Matsudaira How to Create a Great Team Culture (and
Why It Matters) . . . . . . . . . . . . 50
Ulan Degenbaev and
Michael Lippautz and
Hannes Payer Garbage Collection as a Joint Venture 60
Thomas A. Limoncelli Tom's Top Ten Things Executives Should
Know About Software . . . . . . . . . . 70
Zachary C. Lipton and
Jacob Steinhardt Troubling Trends in Machine Learning
Scholarship . . . . . . . . . . . . . . 80
Adrian Colyer GAN Dissection and Datacenter RPCs . . . 10
Natasha Noy and
Yuqing Gao and
Anshu Jain and
Anant Narayanan and
Alan Patterson and
Jamie Taylor Industry-scale Knowledge Graphs: Lessons
and Challenges . . . . . . . . . . . . . 20
Kate Matsudaira Overly Attached . . . . . . . . . . . . 30
Anna Wiedemann and
Nicole Forsgren and
Manuel Wiesche and
Heiko Gewald and
Helmut Krcmar The DevOps Phenomenon . . . . . . . . . 40
David Evans and
Richard McDonald and
Terry Coatta Access Controls and Health Care Records:
Who Owns the Data? . . . . . . . . . . . 50
Pat Helland Extract, Shoehorn, and Load . . . . . . 60
George Neville-Neil MUST and MUST NOT . . . . . . . . . . . 70
Russ Cox Surviving Software Dependencies . . . . 80
Adrian Colyer Time Protection in Operating Systems and
Speaker Legitimacy Detection . . . . . . 10
Jessie Frazelle Open-source Firmware . . . . . . . . . . 20
Kate Matsudaira The Evolution of Management . . . . . . 30
Tom Killalea Velocity in Software Engineering . . . . 40
Thomas A. Limoncelli Demo Data as Code . . . . . . . . . . . 50
George Neville-Neil What is a CSO Good For? . . . . . . . . 60
Shaul Kfir and
Camille Fournier DAML: The Contract Language of
Distributed Ledgers . . . . . . . . . . 70
Terence Kelly Persistent Memory Programming on
Conventional Hardware . . . . . . . . . 10
George Neville-Neil Koding Academies . . . . . . . . . . . . 20
Michelle Vaccaro and
Jim Waldo The Effects of Mixing Machine Learning
and Human Judgment . . . . . . . . . . . 30
Pat Helland Write Amplification Versus Read
Perspiration . . . . . . . . . . . . . . 40
Ariana Mirian Hack for Hire . . . . . . . . . . . . . 50
Adrian Colyer Putting Machine Learning into Production
Systems . . . . . . . . . . . . . . . . 60
Adrian Colyer Back under a SQL Umbrella . . . . . . . 10
Matt Godbolt Optimizations in C++ Compilers . . . . . 20
Pat Helland Space Time Discontinuum . . . . . . . . 30
Sanjay Sha The Reliability of Enterprise
Applications . . . . . . . . . . . . . . 40
Thomas A. Limoncelli API Practices If You Hate Your Customers 50
Jessie Frazelle Opening up the Baseboard Management
Controller . . . . . . . . . . . . . . . ??
George V. Neville-Neil Numbers Are for Computers, Strings Are
for Humans . . . . . . . . . . . . . . . ??
David D. Woods and
John Allspaw Revealing the Critical Role of Human
Performance in Software . . . . . . . . ??
Richard I. Cook Above the Line, Below the Line . . . . . ??
Marisa R. Grayson Cognitive Work of Hypothesis Exploration
During Anomaly Response . . . . . . . . ??
Laura M. D. Maguire Managing the Hidden Costs of
Coordination . . . . . . . . . . . . . . ??
J. Paul Reed Beyond the Fix-it Treadmill . . . . . . ??
Jessie Frazelle Securing the Boot Process . . . . . . . ??
George V. Neville-Neil Master of Tickets . . . . . . . . . . . ??
Anonymous Demystifying Stablecoins . . . . . . . . ??
Jessie Frazelle Chipping Away at Moore's Law . . . . . . ??
Thomas A. Limoncelli Communicate Using the Numbers 1, 2, 3,
and More . . . . . . . . . . . . . . . . ??
Charisma Chan and
Beth Cooper Debugging Incidents in Google's
Distributed Systems . . . . . . . . . . ??
Jessie Frazelle Power to the People . . . . . . . . . . ??
Terence Kelly Is Persistent Memory Persistent? . . . . ??
Arvind Narayanan and
Arunesh Mathur and
Marshini Chetty and
Mihir Kshirsagar Dark Patterns: Past, Present, and Future ??
George Neville-Neil Broken Hearts and Coffee Mugs . . . . . ??
Jessie Frazelle The Life of a Data Byte: Be kind and
rewind . . . . . . . . . . . . . . . . . 5--28
Thomas A. Limoncelli Five Nonobvious Remote Work Techniques:
Emulating the efficiency of in-person
conversations . . . . . . . . . . . . . 29--38
George Neville-Neil Sanity vs. Invisible Markings: Tabs vs.
spaces . . . . . . . . . . . . . . . . . 39--42
Pat Helland Data on the Outside vs. Data on the
Inside: Data kept outside SQL has
different characteristics from data kept
inside . . . . . . . . . . . . . . . . . 43--60
Oskar Mencer and
Dennis Allison and
Elad Blatt and
Mark Cummings and
Michael J. Flynn and
Jerry Harris and
Carl Hewitt and
Quinn Jacobson and
Maysam Lavasani and
Mohsen Moazami and
Hal Murray and
Masoud Nikravesh and
Andreas Nowatzyk and
Mark Shand and
Shahram Shirazi The History, Status, and Future of
FPGAs: Hitting a nerve with
field-programmable gate arrays . . . . . 71--82
Jeff Sutherland and
Ivar Jacobson and
Brian Kerr Scrum Essentials Cards: Experiences of
Scrum Teams Improving with Essence . . . 83--106
Jessie Frazelle Out-of-this-World Additive
Manufacturing: From thingamabobs to
rockets, $3$D printing takes many forms 5--20
George V. Neville-Neil Removing Kode: Dead functions and dead
features . . . . . . . . . . . . . . . . 21--25
Terence Kelly Efficient Graph Search . . . . . . . . . 25--36
Roger Piqueras Jover Security Analysis of SMS as a Second
Factor of Authentication: The challenges
of multifactor authentication based on
SMS, including cellular security
deficiencies, SS7 exploits, and SIM
swapping . . . . . . . . . . . . . . . . 37--60
Phil Vachon The Identity in Everyone's Pocket:
Keeping users secure through their
smartphones . . . . . . . . . . . . . . 61--94
Edlyn V. Levine The Die is Cast: Hardware Security is
Not Assured . . . . . . . . . . . . . . 95--109
Jessie Frazelle Battery Day: a closer look at the
technology that makes portable
electronics possible . . . . . . . . . . 5--25
Thomas A. Limoncelli The Time I Stole \$10,000 from {Bell
Labs}: Or why {DevOps} encourages us to
celebrate outages . . . . . . . . . . . 26--35
George V. Neville-Neil Kabin Fever: KV's guidelines for KFH
(koding from home) . . . . . . . . . . . 35--40
Terence Kelly Decentralized Computing . . . . . . . . 41--53
David Crawshaw Everything VPN is New Again: The
24-year-old security model has found a
second wind . . . . . . . . . . . . . . 54--66
Tom Killalea A Second Conversation with Werner
Vogels: The Amazon CTO sits with Tom
Killalea to discuss designing for
evolution at scale . . . . . . . . . . . 67--92
Miguel Guevara and
Damien Desfontaines and
Jim Waldo and
Terry Coatta Differential Privacy: The Pursuit of
Protections by Default: a discussion
with Miguel Guevara, Damien
Desfontaines, Jim Waldo, and Terry
Coatta . . . . . . . . . . . . . . . . . 93--112
Jessie Frazelle Let's Play Global Thermonuclear Energy:
It's important to know where your power
comes from . . . . . . . . . . . . . . . 5--20
Pat Helland Baleen Analytics: Large-scale filtering
of data provides serendipitous surprises 21--30
George V. Neville-Neil The Non-psychopath's Guide to Managing
an Open-source Project: Respect your
staff, learn from others, and know when
to let go . . . . . . . . . . . . . . . 30--36
Terence Kelly Offline Algorithms in Low-Frequency
Trading: Clearing Combinatorial Auctions 37--51
Chris Nokleberg and
Brad Hawkes Best Practice: Application Frameworks:
While powerful, frameworks are not for
everyone . . . . . . . . . . . . . . . . 52--77
Jatinder Singh and
Jennifer Cobbe and
Do Le Quoc and
Zahra Tarkhani Enclaves in the Clouds: Legal
considerations and broader implications 78--114
Anonymous Always-on Time-series Database: Keeping
Up Where There's No Way to Catch Up: a
discussion with Theo Schlossnagle,
Justin Sheehy, and Chris McCubbin . . . 115--135
Pat Helland Fail-fast Is Failing\ldots Fast!:
Changes in compute environments are
placing pressure on tried-and-true
distributed-systems solutions. . . . . . 5--15
George V. Neville-Neil Aversion to Versions: Resolving
code-dependency issues . . . . . . . . . 16--19
Nicole Forsgren and
Margaret-Anne Storey and
Chandra Maddila and
Thomas Zimmermann and
Brian Houck and
Jenna Butler The SPACE of Developer Productivity:
There's more to it than you think. . . . 20--48
Mark Russinovich and
Manuel Costa and
Cédric Fournet and
David Chisnall and
Antoine Delignat-Lavaud and
Sylvan Clebsch and
Kapil Vaswani and
Vikas Bhatia Toward Confidential Cloud Computing:
Extending hardware-enforced
cryptographic protection to data while
in use . . . . . . . . . . . . . . . . . 49--76
Niklas Blum and
Serge Lachapelle and
Harald Alvestrand WebRTC --- Realtime Communication for
the Open Web Platform: What was once a
way to bring audio and video to the web
has expanded into more use cases we
could ever imagine. . . . . . . . . . . 77--93
João Varajão Software Development in Disruptive
Times: Creating a software solution with
fast decision capability, agile project
management, and extreme low-code
technology . . . . . . . . . . . . . . . 94--103
Jessie Frazelle A New Era for Mechanical CAD: Time to
move forward from decades-old design . . 5--16
Pat Helland ACID: My Personal ``C`` Change: How
could I miss such a simple thing? . . . 17--20
George V. Neville-Neil In Praise of the Disassembler: There's
much to be learned from the lower-level
details of hardware . . . . . . . . . . 21--28
Terence Kelly and
Weiwei Gu and
Vladimir Maksimovski Schrödinger's Code: Undefined behavior in
theory and practice . . . . . . . . . . 28--44
Ramya Srinivasan and
Ajay Chander Biases in AI Systems: a survey for
practitioners . . . . . . . . . . . . . 45--64
Atefeh Mashatan and
Douglas Heintzman The Complex Path to Quantum Resistance:
Is your organization prepared? . . . . . 65--92
Michael Gardiner and
Alexander Truskovsky and
George Neville-Neil and
Atefeh Mashatan Quantum-safe Trust for Vehicles: The
race is already on . . . . . . . . . . . 93--115
Liu Leqi and
Dylan Hadfield-Menell and
Zachary C. Lipton When Curation Becomes Creation:
Algorithms, microcontent, and the
vanishing distinction between platforms
and creators . . . . . . . . . . . . . . 11--15
Pat Helland Don't Get Stuck in the ``Con'' Game:
Consistency, convergence, and confluence
are not the same! Eventual consistency
and eventual convergence aren't the same
as confluence, either . . . . . . . . . 16--35
George V. Neville-Neil Divide and Conquer: The use and limits
of bisection . . . . . . . . . . . . . . 37--39
Poul-Henning Kamp What Went Wrong?: Why we need an IT
accident investigation board . . . . . . 40--44
Piero Molino and
Christopher Ré Declarative Machine Learning Systems:
The future of machine learning will
depend on it being in the hands of the
rest of us . . . . . . . . . . . . . . . 46--76
Ashish Gehani and
Raza Ahmad and
Hassan Irshad and
Jianqiao Zhu and
Jignesh Patel Digging into Big Provenance (with
SPADE): a user interface for querying
provenance . . . . . . . . . . . . . . . 77--106
Torsten Ullrich Real-world String Comparison: How to
handle Unicode sequences correctly . . . 107--116
Terence Kelly Crashproofing the Original NoSQL
Key--Value Store: an upgrade for the \tt
gdbm database . . . . . . . . . . . . . 5--18
Anonymous Patent Absurdity: a case when ignorance
is the best policy . . . . . . . . . . . 19--22
Poul-Henning Kamp The Software Industry IS STILL the
Problem: The time is (also) way overdue
for IT professional liability . . . . . 23--28
Patrick Thomson Static Analysis: an Introduction: The
fundamental challenge of software
engineering is one of complexity . . . . 29--41
Timothy Clem and
Patrick Thomson Static Analysis at GitHub: an experience
report . . . . . . . . . . . . . . . . . 42--67
Ayman Nadeem Human-Centered Approach to
Static-Analysis-Driven Developer Tools:
The future depends on good HCI . . . . . 68--95
Daniil Tiganov and
Lisa Nguyen Quang Do and
Karim Ali Designing UIs for Static Analysis Tools:
Evaluating tool design guidelines with
SWAN . . . . . . . . . . . . . . . . . . 97--118
Jessie Frazelle Chip Measuring Contest: The benefits of
purpose-built chips . . . . . . . . . . 5--21
George V. Neville-Neil I Unplugged What?: The lessons here are
broader than just a simple ``Don't do
that.'' . . . . . . . . . . . . . . . . 22--25
Kelly Shortridge and
Ryan Petrich Lamboozling Attackers: a New Generation
of Deception: Software engineering teams
can exploit attackers' human nature by
building deception environments. . . . . 26--59
Alvaro Videla Meaning and Context in Computer
Programs: Sharing domain knowledge among
programmers using the source code as the
medium . . . . . . . . . . . . . . . . . 60--68
Margo Seltzer and
Mike Olson and
Kirk McCusick A Conversation with Margo Seltzer and
Mike Olson: The history of Berkeley DB 69--86
Kallista Bonawitz and
Peter Kairouz and
Brendan McMahan and
Daniel Ramage Federated Learning and Privacy: Building
privacy-preserving systems for machine
learning and data science on
decentralized data . . . . . . . . . . . 87--114
Reynold Xin and
Wes McKinney and
Alan Gates and
Chris McCubbin It Takes a Community: The Open-source
Challenge . . . . . . . . . . . . . . . 115--136
Terence Kelly Steampunk Machine Learning: Victorian
contrivances for modern data science . . 5--17
George V. Neville-Neil Getting Off the Mad Path: Debuggers and
assertions . . . . . . . . . . . . . . . 18--21
Poul-Henning Kamp Surveillance Too Cheap to Meter:
Stopping Big Brother would require an
expensive overhaul of the entire system. 22--27
Valerie Chen and
Jeffrey Li and
Joon Sik Kim and
Gregory Plumb and
Ameet Talwalkar Interpretable Machine Learning: Moving
from mythos to diagnostics . . . . . . . 28--56
Phil Vachon The Keys to the Kingdom: a deleted
private key, a looming deadline, and a
last chance to patch a new static root
of trust into the bootloader . . . . . . 57--65
Michael Mattioli FPGAs in Client Compute Hardware:
Despite certain challenges, FPGAs
provide security and performance
benefits over ASICs . . . . . . . . . . 66--88
George V. Neville-Neil The Planning and Care of Data:
Rearranging buckets for no good reason 4--9
Alexandros Gazis and
Eleftheria Katsiri Middleware 101: What to know now and for
the future . . . . . . . . . . . . . . . 10--23
Archie L. Cobbs Persistence Programming: Are we doing
this right? . . . . . . . . . . . . . . 24--39
Brian Eaton and
Jeff Stewart and
Jon Tedesco and
N. Cihan Tas Distributed Latency Profiling through
Critical Path Tracing: CPT can provide
actionable and precise latency analysis. 40--79
Pat Helland Autonomous Computing: We frequently
compute across autonomous boundaries but
the implications of the patterns to
ensure independence are rarely
discussed. . . . . . . . . . . . . . . . 80--104
Poul-Henning Kamp Linear Address Spaces: Unsafe at any
speed . . . . . . . . . . . . . . . . . 5--10
George V. Neville-Neil When Should a Black Box Be Transparent?:
When is a replacement not a replacement? 11--15
Terence Kelly Persistent Memory Allocation: Leverage
to move a world of software . . . . . . 16--30
Benoit Baudry and
Tim Toady and
Martin Monperrus Long Live Software Easter Eggs!: They
are as old as software . . . . . . . . . 31--42
Jenna Butler and
Catherine Yeh Walk a Mile in Their Shoes: The Covid
pandemic through the lens of four tech
workers . . . . . . . . . . . . . . . . 43--66
James Agnew and
Pat Helland and
Adam Cole FHIR: Reducing Friction in the Exchange
of Healthcare Data: a discussion with
James Agnew, Pat Helland, and Adam Cole 67--88
Pat Helland I'm Probably Less Deterministic Than I
Used to Be: Embracing randomness is
necessary in cloud environments. . . . . 5--13
George V. Neville-Neil Securing the Company Jewels: GitHub and
runbook security . . . . . . . . . . . . 14--17
James P. Hughes and
Whitfield Diffie The Challenges of IoT, TLS, and Random
Number Generators in the Real World: Bad
random numbers are still with us and are
proliferating in modern systems . . . . 18--40
Sutapa Mondal and
Mangesh S. Gharote and
Sachin P. Lodha Privacy of Personal Information: Going
incog in a goldfish bowl . . . . . . . . 41--87
Martin Kleppmann and
Peter Alvaro Convergence: Research for Practice
reboot . . . . . . . . . . . . . . . . . 88--95
Poul-Henning Kamp CSRB's Opus One: Comments on the Cyber
Safety Review Board Log4j Event Report 5--10
George V. Neville-Neil The Four Horsemen of an Ailing Software
Project: Don't let the pale rider catch
you with an exception . . . . . . . . . 11--15
Raphael Auer and
Rainer BÃ\P hme and
Jeremy Clark and
Didem Demirag Mapping the Privacy Landscape for
Central Bank Digital Currencies: Now is
the time to shape what future payment
flows will reveal about you . . . . . . 16--38
Mache Creeger The Rise of Fully Homomorphic
Encryption: Often called the Holy Grail
of cryptography, commercial FHE is near 39--60
Michael Loftus and
Andrew Vezina and
Rick Doten and
Atefeh Mashatan The Arrival of Zero Trust: What Does it
Mean? . . . . . . . . . . . . . . . . . 61--79
Matthew Bush and
Atefeh Mashatan From Zero to One Hundred: Demystifying
zero trust and its implications on
enterprise people, process, and
technology . . . . . . . . . . . . . . . 80--106
Ram Alagappan and
Peter Alvaro Crash Consistency: Keeping data safe in
the presence of crashes is a fundamental
problem . . . . . . . . . . . . . . . . 107--115
Thomas A. Limoncelli Split Your Overwhelmed Teams: Two Teams
of Five is Not the Same as One Team of
Ten . . . . . . . . . . . . . . . . . . 5--13
George V. Neville-Neil The Elephant in the Room: It's time to
get the POSIX elephant off our necks . . 14--19
Terence Kelly Literate Executables . . . . . . . . . . 20--32
Peter Ward and
Paul Wankadia and
Kavita Guliani Reinventing Backend Subsetting at
Google: Designing an algorithm with
reduced connection churn that could
replace deterministic subsetting . . . . 33--57
Jorge A. Navas and
Ashish Gehani OCCAM-v2: Combining Static and Dynamic
Analysis for Effective and Efficient
Whole-program Specialization: Leveraging
scalable pointer analysis, value
analysis, and dynamic analysis . . . . . 58--85
Maya Kaczorowski and
Falcon Momot and
George V. Neville-Neil and
Chris McCubbin OSS Supply-chain Security: What Will It
Take? . . . . . . . . . . . . . . . . . 86--102
George V. Neville-Neil All Sliders to the Right: Hardware
Overkill . . . . . . . . . . . . . . . . 4--8
Gabriel Falcao and
JoÃ\pounds o Dinis Ferreira To PiM or Not to PiM: The case for
in-memory inferencing of quantized CNNs
at the edge . . . . . . . . . . . . . . 9--34
Christian Bird and
Denae Ford and
Thomas Zimmermann and
Nicole Forsgren and
Eirini Kalliamvakou and
Travis Lowdermilk and
Idan Gazit Taking Flight with Copilot: Early
insights and opportunities of AI-powered
pair-programming tools . . . . . . . . . 35--57
Guenever Aldrich and
Danny Tsang and
Jason McKenney Three-part Harmony for Program Managers
Who Just Don't Get It, Yet: Open-source
software, open standards, and agile
software development . . . . . . . . . . 58--79
Stefan Nagy and
Peter Alvaro The Fun in Fuzzing: The debugging
technique comes into its own . . . . . . 80--87
George V. Neville-Neil The Parchment Path?: Is there ever a
time when learning is not of value ---
for its own sake? . . . . . . . . . . . 5--11
Terence Kelly and
Yekai Pan Catch-23: The New C Standard Sets the
World on Fire . . . . . . . . . . . . . 12--30
Simson Garfinkel and
Jon Stewart Sharpening Your Tools: Updating
bulk\_extractor for the 2020s . . . . . 30--56
Kelly Shortridge and
Josiah Dykstra Opportunity Cost and Missed Chances in
Optimizing Cybersecurity: The loss of
potential gain from other alternatives
when one alternative is chosen . . . . . 30--56
Zachary Tellman Designing a Framework for Conversational
Interfaces: Combining the latest
advances in machine learning with
earlier approaches . . . . . . . . . . . 85--101
Alfred Spector and
Peter Norvig and
Chris Wiggins and
Jeannette Wing and
Ben Fried and
Michael Tingley More Than Just Algorithms: a discussion
with Alfred Spector, Peter Norvig, Chris
Wiggins, Jeannette Wing, Ben Fried, and
Michael Tingley . . . . . . . . . . . . 102--129
George V. Neville-Neil The Human Touch: There is no substitute
for good, direct, honest training . . . 9--13
Thomas A. Limoncelli Improvement on End-to-End Encryption May
Lead to Silent Revolution: Researchers
are on a brink of what could be the next
big improvement in communication privacy 10--13
Amanda Casari and
Julia Ferraioli and
Juniper Lovato Beyond the Repository: Best practices
for open source ecosystems researchers 14--34
Abi Noda and
Margaret-Anne Storey and
Nicole Forsgren and
Michaela Greiler DevEx: What Actually Drives
Productivity: The developer-centric
approach to measuring and improving
productivity . . . . . . . . . . . . . . 35--53
David Collier-Brown You Don't know Jack about Application
Performance: Knowing whether you're
doomed to fail is important when
starting a project . . . . . . . . . . . 54--65
Edlyn V. Levine Cargo Cult AI: Is the ability to think
scientifically the defining essence of
intelligence? . . . . . . . . . . . . . 66--87
Kostis Kaffes and
Peter Alvaro OS Scheduling: Better scheduling
policies for modern computing systems 88--95
Kate Matsudaira Managing Hybrid Teams: The combination
of on-site and remote workers takes
extra effort from team leaders. . . . . 5--16
Poul-Henning Kamp Don't ``Think of the Internet!'': No
human right is absolute. . . . . . . . . 17--22
Phil Vachon Security Mismatch: Security must be a
business enabler, not a hinderer. . . . 23--28
George V. Neville-Neil Stone Knives and Bear Skins . . . . . . 29--35
Alvaro Videla Echoes of Intelligence: Textual
interpretation and large language models 36--53
Samuel W. Stark and
A. Theodore Markettos and
Simon W. Moore How Flexible is CXL's Memory
Protection?: Replacing a sledgehammer
with a scalpel . . . . . . . . . . . . . 54--64
Ethan Miller and
Achilles Benetopoulos and
George Neville-Neil and
Pankaj Mehra and
Daniel Bittman Pointers in Far Memory: a rethink of how
data and computations should be
organized . . . . . . . . . . . . . . . 75--93
Thomas A. Limoncelli Knowing What You Neeed to Know:
Personal, team, and organizational
effectiveness can be improved with a
little preparation . . . . . . . . . . . 5--17
George V. Neville-Neil Halfway Around the World: Learn the
language, meet the people, eat the food 18--22
Terence Kelly Protecting Secrets from Computers . . . 23--43
Mark Russinovich Confidential Computing: Elevating Cloud
Security and Privacy: Working toward a
more secure and innovative future . . . 44--48
David Kaplan Hardware VM Isolation in the Cloud:
Enabling confidential computing with AMD
SEV-SNP technology . . . . . . . . . . . 49--67
Gobikrishna Dhanuskodi and
Sudeshna Guha and
Vidhya Krishnan and
Aruna Manjunatha and
Michael O'Connor and
Rob Nertney and
Phil Rogers Creating the First Confidential GPUs:
The team at NVIDIA brings
confidentiality and integrity to user
code and data for accelerated computing 68--93
Antoine Delignat-Lavaud and
CÃ\copyright dric Fournet and
Kapil Vaswani and
Sylvan Clebsch and
Maik Riechert and
Manuel Costa and
Mark Russinovich Why Should I Trust Your Code?:
Confidential computing enables users to
authenticate code running in TEEs, but
users also need evidence this code is
trustworthy . . . . . . . . . . . . . . 94--122
Kate Matsudaira Software Managers' Guide to Operational
Excellence: The secret to being a great
engineering leader? Setting up the right
checks and balances . . . . . . . . . . 5--12
Phil Vachon The Security Jawbreaker: Access to a
system should not imply authority to use
it. Enter the principle of complete
mediation . . . . . . . . . . . . . . . 13--21
George V. Neville-Neil Dear Diary: On keeping a laboratory
notebook . . . . . . . . . . . . . . . . 22--28
Geoffrey H. Cooper Device Onboarding using FDO and the
Untrusted Installer Model: FDO's
untrusted model is contrasted with Wi-Fi
Easy Connect to illustrate the
advantages of each mechanism . . . . . . 29--53
Harsh Deokuliar and
Raghvinder S. Sangwan and
Youakim Badr and
Satish M. Srinivasan Improving Testing of Deep-learning
Systems: a combination of differential
and mutation testing results in better
test data . . . . . . . . . . . . . . . 54--65
Ivar Jacobson and
Alistair Cockburn Use Cases are Essential: Use cases
provide a proven method to capture and
explain the requirements of a system in
a concise and easily understood format 66--86
João Varajão and
António Trigo and
Miguel Almeida Low-code Development Productivity: ``Is
winter coming'' for code-based
technologies? . . . . . . . . . . . . . 87--107
Thomas A. Limoncelli What do Trains, Horses, and Home
Internet Installation have in Common?:
Avoid changes mid-process . . . . . . . 5--11
George V. Neville-Neil Is There Another System?: Computer
science is the study of what can be
automated . . . . . . . . . . . . . . . 12--15
Terence Kelly Programmer Job Interviews: The Hidden
Agenda . . . . . . . . . . . . . . . . . 16--26
David Chisnall How to Design an ISA: The popularity of
RISC-V has led many to try designing
instruction sets . . . . . . . . . . . . 27--46
Nicole Forsgren and
Eirini Kalliamvakou and
Abi Noda and
Michaela Greiler and
Brian Houck and
Margaret-Anne Storey DevEx in Action: a study of its tangible
impacts . . . . . . . . . . . . . . . . 47--77
Nigel Smart and
Joshua W. Baron and
Sanjay Saravanan and
Jordan Brandt and
Atefeh Mashatan Multiparty Computation: To Secure
Privacy, Do the Math: a discussion with
Nigel Smart, Joshua W. Baron, Sanjay
Saravanan, Jordan Brandt, and Atefeh
Mashatan . . . . . . . . . . . . . . . . 78--100
Divyansh Kaushik and
Zachary C. Lipton and
Alex John London Resolving the Human-subjects Status of
Machine Learning's Crowdworkers: What
ethical framework should govern the
interaction of ML researchers and
crowdworkers? . . . . . . . . . . . . . 101--127
Peter Alvaro and
Manuel Rigger Automatically Testing Database Systems:
DBMS testing with test oracles,
transaction history, and fuzzing . . . . 128--135
Kate Matsudaira Give Your Project a Name: It goes a long
way toward creating a cohesive team with
strong morale . . . . . . . . . . . . . 5--9
Poul-Henning Kamp Free and Open Source Software --- and
Other Market Failures: Open source is
not a goal as much as a means to an end 10--16
George V. Neville-Neil Software Drift: Open source forking . . 17--22
Queenie Luo and
Michael J. Puett and
Michael D. Smith A ``Perspectival'' Mirror of the
Elephant: Investigating language bias on
Google, ChatGPT, YouTube, and Wikipedia 23--47
Padmal Vitharana and
Shahir A. Daya Challenges in Adopting and Sustaining
Microservice-based Software Development:
Organizational challenges can be more
difficult than technical ones . . . . . 48--72
Christoph Kern Developer Ecosystems for Software
Safety: Continuous assurance at scale 73--99
Yifei Wang From Open Access to Guarded Trust:
Experimenting responsibly in the age of
data privacy . . . . . . . . . . . . . . 100--113
Charles Garcia-Tobin and
Mark Knight Elevating Security with Arm CCA:
Attestation and verification are
integral to adopting confidential
computing . . . . . . . . . . . . . . . 39--56
Jinnan Guo and
Peter Pietzuch and
Andrew Paverd and
Kapil Vaswani Trustworthy AI using Confidential
Federated Learning: Federated learning
and confidential computing are not
competing technologies . . . . . . . . . 87--107
Matthew A. Johnson and
Stavros Volos and
Ken Gordon and
Sean T. Allen and
Christoph M. Wintersteiger and
Sylvan Clebsch and
John Starks and
Manuel Costa Confidential Container Groups:
Implementing confidential computing on
Azure container instances . . . . . . . 57--86
Terence Kelly Zero Tolerance for Bias . . . . . . . . 19--38
Thomas A. Limoncelli Make Two Trips: Larry David's New Year's
resolution works for IT too . . . . . . 5--14
George V. Neville-Neil Structuring Success: The problem with
software structure is people don't
really learn it until they really need
it . . . . . . . . . . . . . . . . . . . 15--18
Raluca Ada Popa Confidential Computing or Cryptographic
Computing?: Tradeoffs between
cryptography and hardware enclaves . . . 108--132
Kate Matsudaira Working Models for Tackling Tech Debt:
Understand the options to tailor an
approach that suits your needs . . . . . 5--13
Poul-Henning Kamp The Expense of Unprotected Free
Software: It's high time FOSS
maintainers got a bit of appreciation 14--18
George V. Neville-Neil Repeat, Reproduce, Replicate: The
pressure to publish versus the will to
defend scientific claims . . . . . . . . 15--20
Erik Meijer Virtual Machinations: Using Large
Language Models as Neural Computers:
LLMs can function not only as databases,
but also as dynamic, end-user
programmable neural computers . . . . . 25--52
Mansi Khemka and
Brian Houck Toward Effective AI Support for
Developers: a survey of desires and
concerns . . . . . . . . . . . . . . . . 53--78
Qian Li and
Peter Kraft Transactions and Serverless are Made for
Each Other: If serverless platforms
could wrap functions in database
transactions, they would be a good fit
for database-backed applications . . . . 79--91
David Collier-Brown You Don't Know Jack about Bandwidth: If
you're an ISP and all your customers
hate you, take heart. This is now a
solvable problem . . . . . . . . . . . . 92--102
Peter Alvaro and
Andrew Quinn Deterministic Record-and-Replay: Zeroing
in only on the nondeterministic actions
of the process . . . . . . . . . . . . .
Catherine Hayes and
David Malone Questioning the Criteria for Evaluating
Non-cryptographic Hash Functions: Maybe
we need to think more about
non-cryptographic hash functions. . . .
Shuvendu Lahiri and
Alexey Svyatkovskiy and
Christian Bird and
Erik Meijer and
Terry Coatta Program Merge: What's Deep Learning Got
to Do with It?: a discussion with
Shuvendu Lahiri, Alexey Svyatkovskiy,
Christian Bird, Erik Meijer and Terry
Coatta . . . . . . . . . . . . . . . . .
George V. Neville-Neil Unwanted Surprises: When that joke of an
API is on you . . . . . . . . . . . . .
João Varajão and
António Trigo Assessing IT Project Success: Perception
vs. Reality: We would not be in the
digital age if it were not for the
recurrent success of IT projects. . . .
Mark Russinovich and
Cédric Fournet and
Greg Zaverucha and
Josh Benaloh and
Brandon Murdoch and
Manuel Costa Confidential Computing Proofs: an
alternative to cryptographic
zero-knowledge . . . . . . . . . . . . .
Phil Vachon Test Accounts: a Hidden Risk: You may
decide the risks are acceptable. But, if
not, here are some rules for avoiding
them. . . . . . . . . . . . . . . . . .
Jim Waldo and
Soline Boussard GPTs and Hallucination: Why do large
language models hallucinate? . . . . . . ??
Stacy M. Branham and
Shahtab Wahid and
Sheri Byrne-Haber and
Jamal Mazrui and
Carlos Muncharaz and
Carl Myhill The State of Digital Accessibility . . . ??
Stacy M. Branham and
Shahtab Wahid It's Time to Make Software Accessible:
Here's how, from OS to organization . . ??
Vinnie Donati Driving Organizational Accessibility:
People often ask about the secret sauce
behind Microsoft's approach to
accessibility and inclusion. It's
simple: We run it like a business . . . ??
Chris Fleizach and
Jeffrey P. Bigham System-class Accessibility: The
architectural support for making a whole
system usable by people with
disabilities . . . . . . . . . . . . . . ??
Sonja Johnson-Yu and
Sanket Shah You Don't Know Jack About AI: And
ChatGPT probably doesn't either . . . . ??
Poul-Henning Kamp Civics is Boring. So, Let's Encrypt
Something!: IT professionals can either
passively suffer political solutions or
participate in the process to achieve
something better . . . . . . . . . . . . ??
George V. Neville-Neil Building on Shaky Ground: We owe it to
the world to make systems work safely
and reliably . . . . . . . . . . . . . . ??
Juanami Spencer Accessibility Considerations for Mobile
Applications: How the Bloomberg Connects
app supports accessibility in the
product and process . . . . . . . . . . ??
Shahtab Wahid Design Systems Are Accessibility
Delivery Vehicles: Making accessibility
support for applications scalable,
productive, and consistent . . . . . . . ??
Achilles Benetopoulos Intermediate Representations for the
Datacenter Computer: Lowering the Burden
of Robust and Performant Distributed
Systems . . . . . . . . . . . . . . . . ??
Marc Brooker and
Ankush Desai Systems Correctness Practices at AWS:
Leveraging Formal and Semi-formal
Methods . . . . . . . . . . . . . . . . ??
Terence Kelly and
Ziheng Aaron Su Retrofitting: Principles and Practice ??
Thomas A. Limoncelli Give Engineers Problems, Not Solutions:
a simple strategy to improve solutions
and boost morale . . . . . . . . . . . . ??
Kate Matsudaira My Career-limiting Communication: Be
thoughtful about your content. You've
got a lot riding on it . . . . . . . . . ??
David R. Morrison Simulation: an Underutilized Tool in
Distributed Systems . . . . . . . . . . ??
George V. Neville-Neil The Drunken Plagiarists: Working with
Co-pilots . . . . . . . . . . . . . . . ??
Mark Russinovich and
Ahmed Salem and
Santiago Zanella-Béguelin and
Yonatan Zunger The Price of Intelligence: Three risks
inherent in LLMs . . . . . . . . . . . . ??
Josie Anugerah and
Eve Martin-Jones The Surprise of Multiple Dependency
Graphs: Dependency resolution is not
deterministic . . . . . . . . . . . . . ??
Russ Cox Fifty Years of Open Source Software
Supply Chain Security: For decades,
software reuse was only a lofty goal.
Now it's very real . . . . . . . . . . . ??
Chip Huyen How to Evaluate AI that's Smarter than
Us: Exploring three strategies:
functional correctness, AI-as-a-judge,
and comparative evaluation . . . . . . . ??
Thomas A. Limoncelli A Clean Approach to Process
Optimization: What I learned from my
dishwasher about automating processes ??
Erik Meijer From Function Frustrations to Framework
Flexibility: Fixing tool calls with
indirection . . . . . . . . . . . . . . ??
George Neville-Neil Analyzing Krazy Kode: Accounting for the
emotional state of the person who wrote
that code . . . . . . . . . . . . . . . ??
Dennis Roellke String Matching at Scale: a call for
interdisciplinary collaboration and
better-directed resources . . . . . . . ??
Kate Matsudaira Peer Mentoring . . . . . . . . . . . . . 5--5
George Neville-Neil Can't We Have Nice Things? . . . . . . . 11--17
Terence Kelly and
Edison Fuh Sandboxing: Foolproof Boundaries vs.
Unbounded Foolishness . . . . . . . . . 18--39
Michael Gschwind AI: It's All About Inference Now: Model
inference has become the critical driver
for model performance. . . . . . . . . . 40--78
Vijay Janapa Reddi Generative AI at the Edge: Challenges
and Opportunities: The next phase in AI
deployment . . . . . . . . . . . . . . . 79--137
Titus Winters and
Leah Rivers and
Salim Virji Develop, Deploy, Operate: a holistic
model for understanding the costs and
value of software development . . . . . 138--162
Peter Alvaro and
Daniel Bittman The Point is Addressing: a brief tour of
efforts to reimagine programming in a
world of changing memories . . . . . . . 163--173
Phil Vachon Security Is Part of Every Critical User
Journey: How else would you make sure
that product security decisions serve
your customers? . . . . . . . . . . . . 5--12
George V. Neville-Neil In Search of Quietude: Learning to say
no to interruption . . . . . . . . . . . 13--17
Andy Wingo WebAssembly: Yes, but for What?: The
keys to a successful Wasm deployment . . 18--30
Ben Titzer WebAssembly: How Low Can a Bytecode Go?:
New performance and capabilities . . . . 31--47
Daniel Ehrenberg When Is WebAssembly Going to Get DOM
Support?: Or, how I learned to stop
worrying and love glue code . . . . . . 48--64
Conrad Watt Concurrency in WebAssembly: Experiments
in the web and beyond . . . . . . . . . 65--85
Erik Meijer Unleashing the Power of End-User
Programmable AI: Creating an AI-first
program Synthesis framework . . . . . . 86--102
Anonymous Latest Developer Headlines: Watch Out
for Bluetooth Sniffers; The Samba Team
announces Samba 3.0.0 RC1; Aussie
Government to See Microsoft Source Code;
U.S. Tech Workers Training Replacements;
`Apache Geronimo' Looks to J2EE
Implementation . . . . . . . . . . . . . ??