Last update: Sat Nov 23 13:42:59 MST 2024
Volume 1, Number 1, March, 2003Steve Bourne From the Editors: Finding the Right Questions . . . . . . . . . . . . . . . 4--4 Avi Freedman Opinion: Securing the Edge . . . . . . . 6, 8--9 Marshall Kirk McKusick Interview with Adam Bosworth . . . . . . 12, 14--21 Christopher Vincent Toolkit: Scripting Web Service Prototypes . . . . . . . . . . . . . . . 22, 23--27 Mike Burner The Deliberate Revolution: Transforming Integration With XML Web Services . . . 28--37 Stans Kleijnen and Srikanth Raju An Open Web Services Architecture . . . 38--46 Ali Arsanjani and Brent Hailpern and Joanne Martin and Peri Tarr Web Services: Promises and Compromises 48--58
George Neville-Neil From the Editors: The Truth About Embedded Systems . . . . . . . . . . . . 4--4 Randy Harr Interview: a Conversation with Jim Ready 6, 8, 10--13 George V. Neville-Neil Programming Without a Net . . . . . . . 16--23 Telle Whitney and George Neville-Neil SoC: Software, Hardware, Nightmare, Bliss . . . . . . . . . . . . . . . . . 24--31 Ivan Godard Division of Labor In Embedded Systems 32--41 Homayoun Shahri Blurring Lines Between Hardware and Software . . . . . . . . . . . . . . . . 42--49 Rolf Ernst Putting It All Together . . . . . . . . 50--55
Terry Coata From the Editors: Would You Like Some Data with That? . . . . . . . . . . . . 4--4 Jef Raskin The Woes of IDEs . . . . . . . . . . . . 8, 10--11 Stu Feldman Interview: a Conversation with Mario Mazzola . . . . . . . . . . . . . . . . 12, 14--16 Michael W. Ritter The Future of WLAN . . . . . . . . . . . 18--27 Bill McFarland and Michael Wong The Family Dynamics of 802.11 . . . . . 28--38 Lyn Bartram and Michael Blackstock Designing Portable Collaborative Networks . . . . . . . . . . . . . . . . 40--49 Robert Poor and Cliff Bowman and Charlotte Burgess Auburn Self-Healing Networks . . . . . . . . . 52--59 Robert J. Berger Open Spectrum: a Path to Ubiquitous Connectivity . . . . . . . . . . . . . . 60--68 Douglas B. Terry and Venugopalan Ramasubramanian Caching XML Web Services for Mobility 70--78
Randy Harr Storage --- $n$ Sides to Every Story . . 4--4 Josh Coates Opinion: Big Storage: Make or Buy? . . . 6--7 David Patterson Interview: a Conversation with Jim Gray 8, 10--12, 14--17 Dave Anderson You Don't Know Jack about Disks . . . . 20--30 Peter Lyman and Hal R. Varian Sidebar: How Much Storage is Enough? . . 28--29 Erik Riedel Storage Systems: Not Just a Bunch of Disks Anymore . . . . . . . . . . . . . 32--41 Jeffrey S. Goldner The Emergence of iSCSI . . . . . . . . . 44--53 Steve Kleiman DAFS: a New High-Performance Networked File System . . . . . . . . . . . . . . 54--62
Eric Allman and Marshall Kirk McKusick From the Editors: Viewing Open Source with an Open Mind . . . . . . . . . . . 6--7 Anonymous News 2.0: Uncrackable passwords; WebFountain drinks down the Web; Embracing open source in India . . . . . 8--8 Eric Allman Interview: a Conversation with Chris DiBona . . . . . . . . . . . . . . . . . 10, 12--19 Jim Barton From Server Room to Living Room . . . . 20--28, 31--32 Paul Ferris The Age of Corporate Open Source Enlightenment . . . . . . . . . . . . . 34--44 Michael J. Karels Commercializing Open Source Software . . 46--55 John M. Weathersby, Jr. Sidebar: a Foot in the Door: Can Open Source Find Traction in Government? . . 52--53 Greg Lehey Closed Source Fights Back: SCO vs. the World --- What Were They Thinking? . . . 56--62
David J. Brown and George V. Neville-Neal and Terry Coatta From the Editors: The Developer's Art Today: Aikido or Sumo? . . . . . . . . . 6--7 Anonymous News 2.0: Outfoxing outsourcing; Australia pushes for less spam; There's a bug in my lunchbox . . . . . . . . . . 8--8 Jef Raskin Opinion: User Interface Designers, Slaves of Fashion . . . . . . . . . . . 10--11 David Brown Interview: a Conversation with Wayne Rossing . . . . . . . . . . . . . . . . 12, 14--20 Michael Donat Debugging in an Asynchronous World . . . 22--30 Donn M. Seeley Coding Smart: People vs. Tools . . . . . 32--40 George V. Neville-Neal Code Spelunking: Exploring Cavernous Code Bases . . . . . . . . . . . . . . . 42--48 Peter Phillips and George Phillips No Source Code? No Problem! . . . . . . 50--57 Terry Coata Another Day, Another Bug . . . . . . . . 58--61 Eric Allman Spam, Spam, Spam, Spam, Spam, the FTC, and Spam . . . . . . . . . . . . . . . . 62--69 Michael Mayor Sidebar: I Challenge You to Respond? . . 66--67 R. Ballance Book Review: \em Java Precisely, by Peter Seetoft, MIT Press, 2002, \$14.95, ISBN 0-262-69276-7} . . . . . . . . . . 70--70 D. Chesley Book Review: \em 802.11 Security, by Bruce Potter and Bob Fleck, O'Reilly, 2002, \$34.95, ISBN 0-596-00290-4} . . . 70--70
Mike MacFaden From the Editors: CPUs with 2,000 MIPS per Watt, Anyone? . . . . . . . . . . . 4--4 Jim Coleman and R. Bob Lee and Mel Ray Notage and Bill McFarland Letters: OpenOffice in Home Office; The ``Smart Disk'' Is Already Here; 802.11 in Action . . . . . . . . . . . . . . . 5--5 Anonymous News 2.0: Sugar Cubes Rock; Can a Personal Server Really Save Your Day?; Hot Chips Run Cool . . . . . . . . . . . 6--6 Phillip A. Laplante Opinion: Stand and Deliver: Why I Hate Stand-Up Meetings . . . . . . . . . . . 7--9 Alexander Wolfe Toolkit: Microsoft's Compact Framework Targets Smart Devices . . . . . . . . . 10--12 David Ditzel Interview: a Conversation with Dan Dobberpuhl . . . . . . . . . . . . . . . 14--24 Shekhar Borkar Getting Gigascale Chips: Challenges and Opportunities in Continuing Moore's Law 26--33 Nick Tredennick and Brion Shimamoto The Inevitability of Reconfigurable Systems . . . . . . . . . . . . . . . . 34--43 Marc A. Viredaz and Lawrence S. Brakmo and William R. Hamburgen Energy Management on Handheld Devices 44--52 Wu-chun Feng Making a Case for Efficient Supercomputing . . . . . . . . . . . . . 54--64 Andrew Grover Modern System Power Management . . . . . 66--72 Caspar Boekhoudt The Big Bang Theory of IDEs . . . . . . 74--82 Diomidis Spinellis Reading, Writing, and Code . . . . . . . 84--89 Joan Horvath Book Review: \em Lean Software Development: An Agile Toolkit, by Mary Poppendieck and Tom Poppendieck, Addison-Wesley, 2003, \$39.99, ISBN 0-321-15078-3} . . . . . . . . . . . . . 90--91 Fernando Berzal Book Review: \em Design Methods for Reactive Systems, by R. J. Wieringa, Morgan Kaufmann, 2002, \$64.95, ISBN 1-55860-755-2} . . . . . . . . . . . . . 90--91 Anonymous Calendar . . . . . . . . . . . . . . . . 92--92 Eric Allman Curmudgeon: Wireless Networking Considered Flaky . . . . . . . . . . . . 96, 95
Wendy A. Kellogg From the Editors . . . . . . . . . . . . 5--5 Andrew Eberbach and Jef Raskin and Mike Frisch and Mark Scott and Harry Rudin Letters: Slaves of Fashion; On Heretics and Zealots; The FTC and Spam . . . . . 6--6 Anonymous News 2.0: Gates to Get ATM Free?; RFIDs Reverse Roles; Moore's Law of Cyber-Crime: Say It Isn't so; WI-FI $+$ VoIP $=$ My New Phone? . . . . . . . . . 8--8 Marshall T. Rose Opinion: On Helicopters and Submarines 10, 12--13 Alexander Wolfe Toolkit: Eclipse: a Platform Becomes an Open-Source Woodstock . . . . . . . . . 14--16 Eric Allman Interview: a Conversation with Peter Ford . . . . . . . . . . . . . . . . . . 18, 20--27 John C. Tang and James Bo Begole Beyond Instant Messaging . . . . . . . . 28--37 Frank Jania Broadcast Messaging: Messaging to the Masses . . . . . . . . . . . . . . . . . 38--43 Joe Hildebrand Nine IM Accounts and Counting . . . . . 44--50 George W. Fitzmaurice and Azam Khan and William Buxton and Gordon Kurtenback and Ravin Balakrishnan Sentient Data Access via a Diverse Society of Devices . . . . . . . . . . . 52--62 Seth Hallem and David Park and Dawson Engler Uprooting Software Defects at the Source 64--71 William Stevenson Book Review: \em Cocoa in a Nutshell by Michael Beam and James Duncan Davidson, O'Reilly & Associates, 2003, \$39.95, ISBN 0-596-00462-1} . . . . . . . . . . 72--72 V. B. Kaujalgi Book Review: \em The Bug by Ellen Ullman, Nan A. Talese/Doubleday, 2003, \$23.95, ISBN 0-385-50860-3} . . . . . . 72--72 Anonymous Calendar . . . . . . . . . . . . . . . . 74--74 Jakob Nielsen Curmudgeon: IM, Not IP (Information Pollution) . . . . . . . . . . . . . . . 76, 75
Edward Grossman From the Editors: New World Order . . . 5--5 Matt Elberson and Kurth Guntheroth and Rodney M. Bates and Donald E. Amby Letters: Software Development Tools: Cautionary Tales; Coding for Readability 6--6 Anonymous News 2.0: China's Tech Blast-Off; Thou Shalt Not Print; Dust Dreams . . . . . . 8--8 Jef Raskin Opinion: Silicon Superstitions . . . . . 10--12 Alexander Wolfe Toolkit: GNU Tools, Still Relevant? . . 14, 16--17 Tony Wasserman Interview: a Conversation with Steve Hagan . . . . . . . . . . . . . . . . . 18, 20--25 Michael Turnlund Distributed Development: Lessons Learned 26--31 Ken Coar The Sun Never Sits on Distributed Development . . . . . . . . . . . . . . 32--39 Li-Te Cheng and Cleidson R. B. de Souza and Susanne Hupfer and John Patterson and Steven Ross Building Collaboration into IDEs . . . . 40--50 Judith S. Olson and Gary M. Olson Culture Surprises in Remote Software Development Teams . . . . . . . . . . . 52--59 Gordon Bell Sink or Swim: Know When It's Time to Bail . . . . . . . . . . . . . . . . . . 60--67 James A. Whittaker and Herbert H. Thompson Black Box Debugging . . . . . . . . . . 68--74 Lee Imrey Book Review: \em The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh, Delacorte Press, 2000, \$15.00, ISBN 0-385-49532-3} . . . . . . . . . . . . . 76--76 Fernando Berzal Book Review: \em Agile Software Development, Principles, Patterns, and Practices by Robert C. Martin, Prentice Hall, 2002, \$55.00, ISBN 0-13-597444-5} 76--76 Anonymous Calendar . . . . . . . . . . . . . . . . 77--77 Eric Allman Curmudgeon: The Economics of Spam . . . 80, 78--79
Edward Grossman From the Editors: Fund and Games and Software Development . . . . . . . . . . 5--5 Randy Senske and Azam Khan and Taylor Cowan and Phillip Laplante and The Editors Letters: Sentient Data: The Notion of Location; Stand-Up Meetings Really Suck; Errata: The Game of Life . . . . . . . . 6--6 Anonymous News 2.0: Boba Fett on the Microsoft Payroll?; Wi-Fi Goes WAPI; Photons and Molecules: a New Partnership; SETI Where Are You, Mersenne Prime? . . . . . . . . 8--8 Phillip A. Laplante and Colin J. Neill Opinion: The Demise of the Waterfall Model Is Imminent . . . . . . . . . . . 10--15 Alexander Wolfe Toolkit: Java is Jumpin' . . . . . . . . 16--19 Chris DiBona Interview: a Conversation with Will Harvey . . . . . . . . . . . . . . . . . 20--27 Jonathan Blow Game Development: Harder Than You Think 28--37 Michi Henning Massively Multiplayer Middleware . . . . 38--45 Andrew M. Phelps and David M. Parks Fun and Games: Multi-Language Development . . . . . . . . . . . . . . 46--56 Alexander Nareyek AI in Computer Games . . . . . . . . . . 58--65 Dean Macri The Scalability Problem . . . . . . . . 66--73 Bruce Schneier Sensible Authentication . . . . . . . . 74--78 John Richards and Jim Christensen People in Our Software . . . . . . . . . 80--86 Joy Gumz Book Review: \em Hacking Exposed: Network Security Secrets and Solutions, 4th ed., by Stuart McClure, Joel Scambray, and George Kurtz, McGraw-Hill, 2003, \$49.99, ISBN 0-07-222742-7} . . . 88--88 Martin Schweitzer Book Review: \em Linux in a Nutshell, 4th ed., by Ellen Siever, Stephen Figgins, and Aaron Weber, O'Reilly Books, 2003, \$39.95, ISBN 0-596-00482-6} . . . . . . . . . . . . . 88--88 Anonymous Calendar . . . . . . . . . . . . . . . . 90--90 Josh Coates Curmudgeon: When Bad People Happen to Good Games . . . . . . . . . . . . . . . 92, 91
Richard F. Lyon From the Editors: DSP 4 You . . . . . . 6--6 Jack M. Nilles and Joe Fenn and Jim Gray Letters: Required Reading for Telemanagers; State of the Carrier Industry . . . . . . . . . . . . . . . . 7--7 Anonymous News 2.0: The Farmer and the Hacker; Milk and Algorithms Make for Strong Bones; Keep Your Distance . . . . . . . 8--8 Alexander Wolfe Toolkit: Get Your Graphics On: OpenGL Advances with the Times . . . . . . . . 10, 12--13 Robert Broderson Interview: a Conversation with Teresa Meng . . . . . . . . . . . . . . . . . . 14, 16--21 Gene Frantz and Ray Simar DSP: Of Processors and Processing . . . 22--30 Homayoun Shahri Mapping Algorithms to DSP Architectures 32--41 W. Patrick Hays DSPs: Back to the Future . . . . . . . . 42--51 William J. Dally and Ujval J. Kapasi and Brucek Khailany and Jung Ho Ahn and Abhishek Das Stream Processors: Programmability and Efficiency . . . . . . . . . . . . . . . 52--62 Boris Murmann and Bernhard Boser Digitally Assisted Analog Integrated Circuits . . . . . . . . . . . . . . . . 64--71 Alex E. Bell Death by UML Fever . . . . . . . . . . . 72--80 Grady Booch The Fever is Real . . . . . . . . . . . 81--81 Laury Verner BPM: The Promise and the Challenge . . . 82--91 J. P. E. Hidgson Book Review: \em Linux on the Mainframe by John Eilert, Maria Eisenhaendler, Dorothea Matthaeu, and Ingol Salm, Prentice Hall Professional Technical Reference, 2003, \$49.99, ISBN 0-13-101415-3} . . . . . . . . . . . . . 92--92 H. I. Kilov Book Review: \em The Simplicity Shift: Innovative Design Tactics in a Corporate World by Scott Jenson, Cambridge University Press, 2002, \$25, ISBN 0-521-52749-X} . . . . . . . . . . . . . 92--92 Anonymous Calendar . . . . . . . . . . . . . . . . 94--94 Stan Kelly-Bootle Curmudgeon: Damnéd Digits . . . . . . . . 96, 95
Edward Grossman From the Editors: Search --- An Enterprising Affair . . . . . . . . . . 6--6 Lynn H. Maxson and Joseph M. Saur and Colin Neill and Phillip Laplante Letters: Waterfall Redux . . . . . . . . 8--8 Anonymous News 2.0: Office Suites, Meet NBOR; Security Comes First, Eventually; Three Strikes and You're Out; LOTR SneakerNet iPod . . . . . . . . . . . . . . . . . . 9--9 Jef Raskin Opinion:The GIGO Principle and Voting Machines . . . . . . . . . . . . . . . . 10--11 Alexander Wolfe Toolkit: Intel Is Stealth Source of Heavy-Duty Software Tools . . . . . . . 12, 14, 16--17 Steve Kirsch Interview: a Conversation with Matt Wells . . . . . . . . . . . . . . . . . 18, 20--24 William A. Woods Searching vs. Finding . . . . . . . . . 26--35 Rajat Mukherjee and Jianchang Mao Enterprise Search: Tough Stuff . . . . . 36--46 Anna Patterson Why Writing Your Own Search Engine Is Hard . . . . . . . . . . . . . . . . . . 48--53 Mike Cafarella and Doug Cutting Building Nutch: Open Source Search . . . 54--61 Nick Porcino Gaming Graphics: The Road to Revolution 62--71 John Stone and Sarah Merrion Instant Messaging or Instant Headache? 72--80 Susan M. Merritt Book Review: \em Extreme Programming Refactored: The Case Against XP by Matt Stephens and Doug Rosenberg, APress, 2003, \$39.99, ISBN 1-590-59096-1} . . . 81--81 Joy Gumz Book Review: \em Computer and Intrusion Forensics edited by George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, and Rod McKemmish, Artech House, 2003, \$79.00, ISBN 1-580-53369-8} . . . . . . 81--81 Anonymous Calendar . . . . . . . . . . . . . . . . 82--82 David J. Brown Curmudgeon: Search Hurts . . . . . . . . 84, 83
Eric Allman and Marshall Kirk McKusick From the Editors: Open Source Revisited 8--9 Mike Brady and Vladimir Sanchez Letters: Sender Pays?; Errata: [Alexander Nareyek, AI in Computer Games, ACM Queue 1(10) 58--65 (2004)] 10--10 Anonymous News 2.0: Big Book to Better the World; A Cardboard Computer?; Obje---That's French for Interoperability . . . . . . 11--11 Rodney Bates Opinion: Buffer Overrun Madness . . . . 12, 14 James Russell Interview: a Conversation with Sam Leffler . . . . . . . . . . . . . . . . 16--22 Jordan Hubbard Open Source to the Core . . . . . . . . 24--31 David Ascher Is OS Right for You? (A Fictional Case Study) . . . . . . . . . . . . . . . . . 32--38 Jay Michaelson There's No Such Thing as a Free (Software) Lunch . . . . . . . . . . . . 40--47 Bart Decrem Desktop Linux: Where Art Thou? . . . . . 48--56 Andy Currid TCP Offload to the Rescue . . . . . . . 58--65 Ramana Rao From IR to Search, and Beyond . . . . . 66--73 Dennis Anderson Book Review: \em RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification by Klaus Finkenzeller, John Wiley & Sons, 2003, \$125, ISBN 0-470-84402-7} . . . . . . . . . . . . . 74--74 S. V. Nagaraj Book Review: \em Advances in Evolutionary Computing: Theory and Applications by Ashish Ghosh and Shigeyoshi Tsutsui, Springer-Verlag, 2003, \$109, ISBN 3-540-43330-9} . . . . 74--74 Anonymous Calendar . . . . . . . . . . . . . . . . 76--76 Josh Coates Curmudgeon: a Bigot by Any Other Name\ldots . . . . . . . . . . . . . . . 80, 78
Edward Grossman From the Editors: The New Screen of Death . . . . . . . . . . . . . . . . . 8--8 Subir Sengupta and Chris Maeda and Pamela R. Mason and Jayson Durham and Cynthia Browning and Mike Zom and Chris Vickery and Jon Ogden and Stephen Vinowski and Dave McComb and Peter Thomas Letters: Crossing Time Zones; Is DSP Right for You?; Can Business Process Management Deliver?; That Kelly-Bootle!; Stricken by UML Fever; Errata [Alexander Wolfe, Toolkit: Get Your Graphics On: OpenGL Advances with the Times, ACM Queue 2(1), 10, 12--13 (2004)] . . . . . 10--10 Anonymous News 2.0: Communications from a Field Near You; Light-Speed Disk Drives; Hand-Delivered Curried Spam?; Mind Control for the Masses? . . . . . . . . 12--12 Phillip A. Laplante Opinion: First, Do No Harm: a Hippocratic Oath for Software Developers? . . . . . . . . . . . . . . 14--18 Alexander Wolfe Toolkit: Grid Tools: Coming to a Cluster Near You . . . . . . . . . . . . . . . . 20--23 Stuart Feldman Interview: a Conversation with Brewster Kahle . . . . . . . . . . . . . . . . . 24, 26--30, 32--33 Jim Morrison Blaster Revisited . . . . . . . . . . . 34--43 Marcus J. Ranum Security: The root of the Problem . . . 44--49 Ben Laurie Network Forensics . . . . . . . . . . . 50--56 Herbert H. Thompson and Richard Ford Perfect Storm: The Insider, Naivety, and Hostility . . . . . . . . . . . . . . . 58--65 Kenneth N. Lodding The Hitchhiker's Guide to Biomorphic Software . . . . . . . . . . . . . . . . 66--75 Shrisha Rao Book Review: \em Molecular Computing edited by Tanya Sienko, Andrew Adamatzky, Nicholas G. Rambidi, and Michael Conrad, MIT Press, 2003, \$45.00, ISBN 0-262-19487-2} . . . . . . 76--76 Gregory D. Peterson Book Review: \em Embedded Software for SoC, edited by Ahmed Amine Jerraya, Sungjoo Yoo, Norbert When, and Diederik Verkest, Kluwer Academic Publishers, 2003, \$174.00, ISBN 1-4020-7528-6} . . 76--76 Anonymous Calendar . . . . . . . . . . . . . . . . 78--78 Stan Kelly-Bootle Curmudgeon: From This Moment On . . . . 80, 79
Edward Grossman From the Editors: Virtually Yours . . . 8--8 Robert Cody and Lawrence C. Paulson and Todd Greer and Rodney Bates and Daniel Myer and Gary Hewitt and Jay Michaelson and John C. Nash and Josh Coates Letters: Buffer Overrun Madness; Open Source: All Grown Up?; When is Free Really \em Free?; It's Not Cool to be a Bigot . . . . . . . . . . . . . . . . . 10--10 Anonymous News 2.0: Leave it to the Irish; The Tammy Faye Scam; Throttling Back Network Attacks . . . . . . . . . . . . . . . . 12--12 Jef Raskin Opinion: For Want of a Comma, the Meaning Was Lost . . . . . . . . . . . . 14--16 Alex Wolfe Toolkit: Samba Does Windows-to-Linux Dance . . . . . . . . . . . . . . . . . 18--21 Anonymous What's on Your Hard Drive? . . . . . . . 22--22 Eric Allman Interview: a Conversation with James Gosling . . . . . . . . . . . . . . . . 24--33 Mendel Rosenblum The Reincarnation of Virtual Machines 34--40 Poul-Henning Kamp and Robert Watson Building Systems to Be Shared, Securely 42--51 Bob Supnik Simulators: Virtual Machines of the Past (and Future) . . . . . . . . . . . . . . 52--58 John Viega and Matt Messier Security is Harder than You Think . . . 60--65 Douglas C. Schmidt and Aniruddha Gokhale and Balachandran Natarajan Leveraging Application Frameworks . . . 66--75 Frank Pospiech Book Review: \em Critical Testing Process: Plan, Prepare, Perform, Perfect, by Rex Black, Addison-Wesley Professional, 2003, \$49.99, ISBN 0-201-74868-1} . . . . . . . . . . . . . 76--76 A. K. Menon Book Review: \em Balancing Agility and Discipline: A Guide for the Perplexed, by Barry Boehm and Richard Turner, Addison-Wesley Professional, 2003, \$29.99, ISBN 0-321-18612-5} . . . . . . 76--76 Anonymous Calendar . . . . . . . . . . . . . . . . 78--78 Stan Kelly-Bootle Curmudgeon: Without a NULL That String Would Never End . . . . . . . . . . . . 80, 79
Edward Grossman From the Editors: Calling All Cars [overstrike] Readers . . . . . . . . . . 8--8 Jeffrey R. Coates and Vadim Kavalerov and Brian Goetz and Marcus Ranum and Ryan McLoughlin and Robert Angelino Letters: Buffer Overruns and Everyone; Another Look at Security Problems . . . 10--10 Anonymous News 2.0: Smoke Signals, Cellphone Style; File Sharing: Crime and Punishment Unplugged; Musican Composition by Any\_Body . . . . . . . . 11--11 Rodney Bates Opinion: Schizoid Classes . . . . . . . 12--15 Alexander Wolfe Toolkit: Longhorn Ties Platform Apps to Core Operating System . . . . . . . . . 16--19 Anonymous What's on Your Hard Drive? . . . . . . . 20--20 Lucy Sanders Interview: a Conversation with Donald Peterson . . . . . . . . . . . . . . . . 22--29 Phil Sherburne and Cary Fitzgerald You Don't Know Jack About VoIP . . . . . 30--38 James E. Coffman Not Your Father's PBX? . . . . . . . . . 40--47 Sudhir R. Ahuja and Robert Ensor VoIP: What is it Good for? . . . . . . . 48--55 Douglas C. Sicker and Tom Lookabaugh VoIP Security: Not an Afterthought . . . 56--64 Gordon Bell A Time and a Place for Standards . . . . 66--74 Hector Zenil Chavez Book Review: \em Quantum Computing (Natural Computing Series), 2nd ed., by Mika Hirvensalo, Springer-Verlag, 2004, \$54.95, ISBN 3-540-40704-9} . . . . . . 76--76 Andre Mariën Book Review: \em Security Warrior by Cyrus Peikari and Anton Chuvakin, O'Reilly, 2004, \$44.95, ISBN 0-596-00545-8} . . . . . . . . . . . . . 76--76 Anonymous Calendar . . . . . . . . . . . . . . . . 78--78 Stan Kelly-Bootle Curmudgeon: Vote Early, Vote Often . . . 80--79
Edward Grossman From the Editors: RFID isn't science fiction . . . . . . . . . . . . . . . . 10--10 Edward Grossman Letters . . . . . . . . . . . . . . . . 12--12 Edward Grossman News 2.0 . . . . . . . . . . . . . . . . 13--13 Edward Grossman What's on your hard drive? . . . . . . . 14--14 George Neville-Neil Kode Vicious . . . . . . . . . . . . . . 16--18 Barbara Simons Electronic voting systems: the good, the bad, and the stupid . . . . . . . . . . 20--26 Alexander Wolfe There's still some life left in Ada . . 28--31 George Neville-Neil Interview: a conversation with Mike Deliman . . . . . . . . . . . . . . . . 32--39 Roy Want The magic of RFID . . . . . . . . . . . 40--48 Sanjay Sarma Integrating RFID . . . . . . . . . . . . 50--57 Marshall Kirk McKusick and George V. Neville-Neil Thread scheduling in FreeBSD 5.2 . . . . 58--64 Kang Su Gatlin Trials and tribulations of debugging concurrency . . . . . . . . . . . . . . 66--73 Edward Grossman Review of \em Dynamic Reconfiguration: Architectures and Algorithms by Ramachandran Vaidyanathan and Jerry L. Trahan. Plenum Publishing, 2003, ISBN 0-306-48189-8 . . . . . . . . . . . . . 74--74 Edward Grossman Review of \em Immunity-based systems by Yoshiteru Ishida. Springer-Verlag, 2004, ISBN 3-540-00896-9 . . . . . . . . . . . 74--74 Edward Grossman Calendar . . . . . . . . . . . . . . . . 76--76 Phillip Laplante The burning bag of dung: and other environmental antipatterns . . . . . . . 80
Edward Grossman From the Editors: The guru code . . . . 10--10 Ulrich Grude and Rodney Bates and Annelise Gimpel and Stan Kelly-Bootle and Henri Socha and Bob Supnik and Ian Phillips Letters: Schizoid Classes; Don't Forget to Vote!; Something about Simulators; The Bigots of the World . . . . . . . . 12--12 John Stanik News 2.0: New Web Provides Battery-powered Option; There's Nothing Like a Map; Shall I Compare Thee to a Big Squeeze?; Linux Support: a Black Hole? . . . . . . . . . . . . . . . . . 14--14 Edward Grossman What's on your hard drive? . . . . . . . 16--16 George Neville-Neil Kode Vicious strikes again . . . . . . . 18--21 Steve Bourne Interview: a conversation with Bruce Lindsay . . . . . . . . . . . . . . . . 22--33 Aaron B. Brown Oops! Coping with human error in IT systems . . . . . . . . . . . . . . . . 34--41 Brendan Murphy Automating software failure reporting 42--48 Paul P. Maglio and Eser Kandogan Error messages: what's the problem? . . 50--55 Adam Kolawa Outsourcing: devising a game plan . . . 56--62 Vijay Gill Lack of priority queuing considered harmful . . . . . . . . . . . . . . . . 64--69 Bayard Kohlhepp Review of \em Network Distributed Computing: Fitscapes and Fallacies by Max K. Goff. Prentice Hall Professional Technical Reference, 2003, ISBN 0-13-100152-3 . . . . . . . . . . . . . 70--70 Rita Puzmanova Review of \em Wi-Foo: The Secrets of Wireless Hacking by Andrew Vladimirov, Konstantin V. Gravrilenko, and Andrei A. Mikhailovsky. Pearson Education, 2004, ISBN 0-321-20217-1 . . . . . . . . . . . 70--70 Edward Grossman Calendar . . . . . . . . . . . . . . . . 72--72 Edward Grossman Careers . . . . . . . . . . . . . . . . 74--77 Rodney Bates Curmudgeon: Programming in Franglais . . 80, 78
Edward Grossman From the Editors: The big programming languages issue . . . . . . . . . . . . 10--10 Charles Kerpelman and The Editors and Martin Smith and Harry Rudin and Yaacov Fenster and Marcus Ranum and Scott Howser and Alexander Wolfe Letters: Kode Vicious Wants You; Deliman's da Man; In Want of Nothing; The \tt root of the Problem, Redux; Longhorn and WinFS . . . . . . . . . . . 12--12 John Stanik News 2.0: It Isn't Going Away \ldots But IT Jobs Are; 4 GHz Goes Bust; Trojan-Spyware Deathmatch; Desktop Search Madness . . . . . . . . . . . . . 13--13 Edward Grossman What's on your hard drive? . . . . . . . 14--14 George Neville-Neil Kode Vicious the return . . . . . . . . 16--18 Stuart Feldman Interview: a conversation with Alan Kay 20--30 John R. Mashey Languages, levels, libraries, and longevity . . . . . . . . . . . . . . . 32--38 Roger Sessions Fuzzy boundaries: objects, components, and Web services . . . . . . . . . . . . 40--47 Gregory V. Wilson Extensible programming for the 21st Century . . . . . . . . . . . . . . . . 48--57 Donn Seeley How Not to Write Fortran in Any Language 58--65 Michael W. Shapiro Self-healing in modern operating systems 66--75 M. S. Joy Review of \em Eclipse by Steve Holzner. O'Reilly & Associates, 2004, \$44.95, ISBN 0-596-00641-1} . . . . . . . . . . 76--76 T. Portele Review of \em Spoken Dialogue Technology by Michael F. McTear. Springer-Verlag, 2004, \$59.95, ISBN 1-85233-672-2} . . . 76--76 Edward Grossman Calendar . . . . . . . . . . . . . . . . 77--77 Stan Kelly-Bootle Curmudgeon: Linguae Francae . . . . . . 80, 78--79
Edward Grossman From the Editors: Puttin' the \em Queue in QA . . . . . . . . . . . . . . . . . 8--8 Tim Eure and Ben Kuehlhorn and Vijay Gill and James Synge and Edward Weir and The Editors Letters: RFID Revisited; \em Queueing Up Priority Queueing; Guru Code Overload 10--10 Edward Grossman What's on your hard drive? . . . . . . . 11--11 George Neville-Neil Kode Vicious Unleashed . . . . . . . . . 12--13 Jim Gray Interview: a conversation with Tim Bray 20--25 Stuart Feldman Quality assurance: much more than testing . . . . . . . . . . . . . . . . 26--29 Keith Stobie Too darned big to test . . . . . . . . . 30--37 William W. White Sifting through the software sandbox: SCM meets QA . . . . . . . . . . . . . . 38--44 Michael Donat Orchestrating an automated test lab . . 46--53 Mark Kobayashi-Hillary A passage to India . . . . . . . . . . . 54--60 Arun Ektare Review of \em Designing Software for the Mobile Context: a Practitioner's Guide (Computer Communications and Networks) by Roman Longoria (Ed.), Springer-Verlag, 2004, \$69.95, ISBN 1-85233-785-0} . . . . . . . . . . . . . 61--61 Radu State Review of \em Network Security Architectures by Sean Convery, Cisco Press, 2004, \$55.00, ISBN 1-58705-115-X} . . . . . . . . . . . . . 61--61 Edward Grossman Calendar . . . . . . . . . . . . . . . . 62--62 Terry Coatta Curmudgeon: Traipsing through the QA tools desert . . . . . . . . . . . . . . 64--64
David J. Brown From the editors: An update on software updates . . . . . . . . . . . . . . . . 10--11 Kurt Gunteroth and Greg Wilson and Michael Erdmann and Dmitriy Vasilev and Ed Ravin and Vivek Rao Letters: Extensible Programming, Extended Edition; A Lesson in Self-Healing; Fortran Lives . . . . . . 12--14 John Stanik News 2.0: a Patent Reduction in IP Squabbles; Widgets, Macintosh Style; Biometrics Goes $3$D . . . . . . . . . . 16--16 Edward Grossman What's on your hard drive? . . . . . . . 18--18 George Neville-Neil Kode Vicious reloaded . . . . . . . . . 20, 22 Joseph Dadzie Understanding software patching . . . . 24--30 George Brandman Patching the enterprise . . . . . . . . 32--39 Dorian Birsan On plug-ins and extensible architectures 40--46 Alex E. Bell UML fever: diagnosis and recovery . . . 48--56 David Bellin Review of \em PHP5 and MySQL Bible by Tim Converse and Joyce Park, Clark Morgan Wiley, 2004, \$49.99, ISBN 0-7645-5746-7} . . . . . . . . . . . . . 58--58 R. S. Chang Review of \em Integration-Ready Architecture and Design: Software Engineering with XML, Java, .NET, Wireless, Speech, and Knowledge Technologies by Jeff Zhuk, Cambridge University Press, 2004, \$75.00, ISBN 0-521-52583-7} . . . . . . . . . . . . . 58--58 Edward Grossman Calendar . . . . . . . . . . . . . . . . 60--60 Jef Raskin Curmudgeon: Comments are more important than code . . . . . . . . . . . . . . . 64, 62--63
Edward Grossman From the Editors: I am an abstraction layer . . . . . . . . . . . . . . . . . 8--8 Philip Burgess and Miriam Amos Nihart and Manfred Berndtgen and Dan Griffin and Gabe da Silveira Letters: QA $ ! = $ Testing; More Common than You Think; Kay-OK . . . . . . . . . 10--10 John Stanik News 2.0: Gridding for a Cure; Wanted: Windows Robots; Lost in Licenses . . . . 11--11 Edward Grossman What's on your hard drive? . . . . . . . 14--14 George Neville-Neil Kode Vicious battles on . . . . . . . . 15--17 James Hamilton Interview: a conversation with Pat Selinger . . . . . . . . . . . . . . . . 18--28 Jim Gray and Mark Compton A call to arms . . . . . . . . . . . . . 30--38 James Ostell Databases of discovery . . . . . . . . . 40--48 Margo Seltzer Beyond relational databases . . . . . . 50--58 A. Mariën Review of \em Exploiting Software: How to Break Code by Greg Hoglund and Gary McGraw, Addison-Wesley, 2004, \$49.99, ISBN 0-201-78695-8} . . . . . . . . . . 60--60 Carlos F. Enguix Review of \em Explorer's Guide to the Semantic Web by Thomas B. Passin, Manning Publications, 2004, \$39.95, ISBN 1-932394-20-6} . . . . . . . . . . 61--61 Edward Grossman Calendar . . . . . . . . . . . . . . . . 62--62 Stan Kelly-Bootle Curmudgeon: File under ``unknowable!'' 64, 63
John Stanik From the Editors: Mobile applications get real . . . . . . . . . . . . . . . . 8--8 David H. Winfield and Erik Hoel and The Editors and Georges Brigham and Stan Kelly-Bootle Letters: Readers' Comments are Important, Too; APL $=$ A Possible Lingua Franca? . . . . . . . . . . . . . 10--10 John Stanik News 2.0: Kernel Solid, But Vulnerable; IT Security Get Physical; A Warm Reception for Reject Chips . . . . . . . 14--14 Edward Grossman What's on your hard drive . . . . . . . 15--15 George Neville-Neil Kode Vicious vs. Mothra . . . . . . . . 16--18 Kirk McKusick Interview: a conversation with Tim Marsland . . . . . . . . . . . . . . . . 20--28 Bruce Zenel Enterprise-grade wireless . . . . . . . 30--37 Fred Kitson Mobile media: making it a reality . . . 38--47 Tom Gerstel Streams and standards: delivering mobile video . . . . . . . . . . . . . . . . . 48--53 Kevin Fall and Steve McCanne You don't know jack about network performance . . . . . . . . . . . . . . 54--59 G. K. Jenkins Review of \em Expert .NET Programming by Simon Robinson, Apress, 2004, \$59.99, ISBN 1-59059-222-0} . . . . . . . . . . 60--60 Marlin Thomas Review of \em Building Clustered Linux Systems by Robert W. Lucke, Prentice Hall PTR, 2004, \$49.99, ISBN 0-13-144853-6} . . . . . . . . . . . . . 60--60 Edward Grossman Calendar . . . . . . . . . . . . . . . . 61--61 Phillip Laplante Curmudgeon: Mal Managerium: a Field Guide . . . . . . . . . . . . . . . . . 64, 62--63
Randy Harr From the editors: On feeling secure in an unsafe world . . . . . . . . . . . . 8--8 Vladimir Sanchez and Heidi Markovitz Letters: Selinger's Inspiring Words; Plug-In Predecessors . . . . . . . . . . 12--12 John Stanik News 2.0: Losing our Edge? The Real Cost of Linux; Say No to Crackberries . . . . 14--14 Jim Maurer What's on your hard drive? . . . . . . . 16--16 George Neville-Neil Kode vicious gets dirty . . . . . . . . 18--20 Jim Maurer Interview: a conversation with Peter Tippett and Steven Hofmeyr . . . . . . . 22--32 Thomas Wadlow The answer is $ 42 $ of course . . . . . 34--39 John Viega Security---problem solved? . . . . . . . 40--50 Bruce Schneier Attack trends: 2004 and 2005 . . . . . . 52--53 Ken Arnold Programmers are people, too . . . . . . 54--59 Don Chand Review of \em Privacy: What Developers and IT Professionals Should Know by J. C. Cannon, Addison-Wesley Professional, 2004, \$49.99. ISBN 0-321-22409-4} . . . 60--60 A. Mariën Review of \em IPv6 Network Programming by Jun-ichiro itojun Hagino, Digital Press, 2004, \$49.95, ISBN 1-55558-318-0} . . . . . . . . . . . . . 60--60 Jim Maurer Calendar . . . . . . . . . . . . . . . . 61--61 Rodney Bates Curmudgeon: Syntactic heroin . . . . . . 64, 62--63
Stuart Feldman From the editors: Distributed computing in the modern enterprise . . . . . . . . 8--8 John Stanik News 2.0: ``Ransom-ware'' on the loose; Adopt IPv6 or die; IBM Steps up on Linux training . . . . . . . . . . . . . . . . 10--10 Jim Maurer What's on your hard drive? . . . . . . . 12--12 George Neville-Neil Kode Vicious: Kode Vicious Cycles On . . 14--16 Jim Maurer Interview: a conversation with David Anderson . . . . . . . . . . . . . . . . 18--25 Ian Foster and Steven Tuecke Describing the elephant: the different faces of IT as service . . . . . . . . . 26--29 Dean Jacobs Enterprise software as service . . . . . 36--42 Pankaj Kumar Web services and IT management . . . . . 44--49 Paul Strong Enterprise Grid computing . . . . . . . 50--59 Sajjad Khan Review of ``Struts Recipes by George Franciscus and Danilo Gurovich'', Manning Publications, 2004, \$44.95 ISBN 1-932394-24-9} . . . . . . . . . . . . . 60--60 Radu State Review of ``Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester'', McGraw-Hill Osborne Media, 2004, \$49.99 ISBN 0-07-225709-1} . . . . . . . . . . 60--60 Jim Maurer Calendar . . . . . . . . . . . . . . . . 61--61 Stanley Kelly-Bootle Curmudgeon: Call that gibberish . . . . 64, 62--63
Jim Maurer News 2.0: Open Source/2; Anti-spam activism \ldots or vigilantism?; Ride, robot, ride . . . . . . . . . . . . . . 8--8 Jim Maurer What's on your hard drive? . . . . . . . 10--10 George Neville-Neil Kode Vicious: KV the Konqueror . . . . . 12--14 Jim Maurer Interview: a conversation with Roger Sessions and Terry Coatta . . . . . . . 16--25 Kunle Olukotun and Lance Hammond The future of microprocessors . . . . . 26--29 Richard McDougall Extreme software scaling . . . . . . . . 36--46 Luiz André Barroso The price of performance . . . . . . . . 48--53 Herb Sutter and James Larus Software and the concurrency revolution 54--62 Mache Creeger Curmudgeon: Multicore CPUs for the masses . . . . . . . . . . . . . . . . . 64, 63
Charlene O'Hanlon From the Editors: Unstructured, but not really . . . . . . . . . . . . . . . . . 8--8 John Stanik News 2.0: OSx86 for the Masses?; OS? We Don't Need No Stinkin' OS; Real Crime Descends upon Virtual World . . . . . . 10--10 Charlene O'Hanlon What's on your hard drive? . . . . . . . 12--12 George Neville-Neil Kode Vicious: Kode Vicious unscripted 14--16 Daniela Florescu Managing semi-structured data . . . . . 18--24 Adam Bosworth Learning from the Web . . . . . . . . . 26--32 C. M. Sperberg-McQueen XML $<$ and semi-structured data$>$ . . . 34--41 Natalya Noy Order from chaos . . . . . . . . . . . . 42--49 Alon Halevy Why your data won't mix . . . . . . . . 50--58 J. S. Edwards Review of ``Slamming Spam: A Guide for System Administrators'' by Robert Haskins and Dale Nielsen, Addison-Wesley Professional, 2004, \$44.99 ISBN 0-13-146716-6} . . . . . . . . . . . . . 60--60 Neil Karl Review of ``Official Eclipse 3.0 FAQs'' by John Arthorne and Chris Laffra, Addison-Wesley Professional, 2004, \$34.99 ISBN 0-321-26838-5} . . . . . . 60--60 Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 61--61 Chris Suver Curmudgeon: The cost of data . . . . . . 64, 62--63
Charlene O'Hanlon From the editors: Socially acceptable behavior . . . . . . . . . . . . . . . . 8--8 John Stanik News 2.0: Acoustical Spying Techniques Cooked up in the Lab; .ODF Delivers Crushing Blow to .DOC; Wikibooks---Coming to a Classroom Near You? . . . . . . . . . . . . . . . . . . 10--10 Charlene O'Hanlon What's on your hard drive? . . . . . . . 12--12 George Neville-Neil Kode Vicious: The Doctor is In . . . . . 14--16 Charlene O'Hanlon Interview: a conversation with Ray Ozzie 18--26 David Millen and Jonathan Feinberg and Bernard Kerr Social bookmarking in the enterprise . . 28--35 Vipul Ved Prakash and Adam O'Donnell Fighting spam with reputation systems 36--41 Andreas Gustafsson Threads without the pain . . . . . . . . 42--47 Andrew McCallum Information extraction: distilling structured data from unstructured text 48--57 Fernando Berzal Review of ``Working Effectively with Legacy Code'', by Michael Feathers, Prentice Hall PTR, 2004, \$44.99 ISBN 0-13-117705-2} . . . . . . . . . . . . . 58--58 G. K. Jenkins Review of ``The Linux Enterprise Cluster'', by Karl Kopper, No Starch Press, 2005, \$49.95 ISBN 1-59327-036-4} 58--58 Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 60--60 David Patterson Curmudgeon: Stop whining about outsourcing! . . . . . . . . . . . . . . 64, 63
Charlene O'Hanlon From the editors: In with the new . . . 8--8 John Stanik News 2.0: Web 2.0---Looking Toward the Future or Reviving the Past?; Easy Come, Easy Splog; Carpal Tunnel Is So Nineties! . . . . . . . . . . . . . . . 10--10 Charlene O'Hanlon What's on your hard drive? . . . . . . . 11--11 George Neville-Neil Kode Vicious: Vicious XSS . . . . . . . 12--15 Charlene O'Hanlon Interview: a conversation with Phil Smoot . . . . . . . . . . . . . . . . . 16--24 Daniel Rogers Lessons from the floor . . . . . . . . . 26--32 Bill Hoffman Monitoring, at your service . . . . . . 34--43 Friedrich Steimann and Thomas Kühne Coding for the code . . . . . . . . . . 44--51 A. K. Menon Review of ``Open Systems and Standards for Software Product Development'' by P. A. Dargan, Artech House, 2005, \$89.00, ISBN 1-58053-749-9} . . . . . . . . . . 52--52 Andreas Tomek Review of ``Intrusion Prevention and Active Response: Deploying Network and Host IPS'' by Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, and Jake Babbin, Syngress Publishing, 2005, \$49.99, ISBN 1-932266-47-X} . . . 52--52 Stan Kelly-Bootle Curmudgeon: Anything Su Doku, I can do better . . . . . . . . . . . . . . . . . 56, 54
Charlene O'Hanlon From the editors: Quality really is job #1 . . . . . . . . . . . . . . . . . . . 8--8 John Stanik News 2.0: IPv6 Gains Government Traction; Search-as-a-Service Gets Serious; When Detecting Life, Is Biometrics All Thumbs? . . . . . . . . . 10--10 Charlene O'Hanlon What's on your hard drive? . . . . . . . 11--11 George Neville-Neil Kode Vicious: Gettin' your kode on . . . 12--14 Charlene O'Hanlon Interview: a conversation with Jarod Jenson . . . . . . . . . . . . . . . . . 16--24 Bryan Cantrill Hidden in plain sight . . . . . . . . . 26--36 Philip Beevers A high-performance team . . . . . . . . 38--43 Bart Smaalders Performance anti-patterns . . . . . . . 44--50 Mark Purdy Modern Performance Monitoring . . . . . 48--57 Arthur Gittleman Review of ``Foundations of Ajax'' by Ryan Asleson and Nathaniel Schutta, APress, 2005, \$39.99, ISBN 1-59059-582-3} . . . . . . . . . . . . . 62--62 Radu State Review of ``Switching to VoIP'' by Ted Wallingford, O'Reilly & Associates, 2005, \$39.95, ISBN 0-596-00868-6} . . . . . . 62--62 Phillip Laplante Curmudgeon: It isn't your father's realtime anymore . . . . . . . . . . . . 64, 63
Nicholas Roeder and Martin Wheatman Letters: Questioning MDD; The Economics of Outsourcing . . . . . . . . . . . . . 7--7 John Stanik News 2.0: Symantec's Semantics; Spyware Defined---For Now; More over Spyware, There's Myware . . . . . . . . . . . . . 8--8 Charlene O'Hanlon Reader files: What's on your hard drive? 9--9 George Neville-Neil Kode Vicious: Human-KV interaction . . . 10--12 Charlene O'Hanlon Interview: a conversation with Steve Ross-Talbot . . . . . . . . . . . . . . 14--23 Peter De Jong Q focus: Workflow systems: Going with the flow . . . . . . . . . . . . . . . . 24--32 James Champy People and process . . . . . . . . . . . 34--38 Derek Miers Best practice (BPM) . . . . . . . . . . 40--48 Duncan Johnston-Watt Under new management . . . . . . . . . . 50--58 Elliot Jaffe Review of ``Pro Perl'' by Peter Wainwright, Apress, 2005, \$59.99, ISBN 1-59059-438-X} . . . . . . . . . . . . . 59--59 Marc Paquette Review of ``Wiki: Web Collaboration'' by Anja Ebersbach, Markus Glaser and Richard Heigl, Springer, 2005, \$64.95, ISBN 3-540-25995-3} . . . . . . . . . . 59--59 Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 60--61 Stan Kelly-Bootle Curmudgeon: But, having said that, \ldots . . . . . . . . . . . . . . . . . 64, 63
Charlene O'Hanlon From the Editors: The private universe 7--7 John Stanik News 2.0: Attackers Set Sights on Macs; Sneakernet Security; IT' Paradox . . . . 8--8 Charlene O'Hanlon What's on your hard drive? . . . . . . . 9--9 George Neville-Neil Kode Vicious: Kode Vicious bugs out . . 10--12 Charlene O'Hanlon Interview: a conversation with Chuck McManis . . . . . . . . . . . . . . . . 13--21 Terry Coatta Q Focus: Purpose-Built Systems: The (not so) hidden computer . . . . . . . . . . 22--26 Jim Barton TiVo-lution . . . . . . . . . . . . . . 28--35 Stephen Johnson Java in a teacup . . . . . . . . . . . . 36--41 Andrea Paramithiotti Review of ``Grid Database Design'' by April Wells, Auerbach Publications, 2005, \$79.95, ISBN 0-8493-2800-4} . . . 42--42 Radu State Review of ``Extrusion Detection: Security Monitoring for Internal Intrusions'' by Richard Bejtlich, Adddison-Wesley Professional, 2005, \$49.99, ISBN 0-321-34996-2} . . . . . . 42--42 Mache Creeger Curmudgeon: Evolution or revolution? . . 56--ff
Charlene O'Hanlon From the editors: The domino effect . . 8--8 John Stanik News 2.0: Programmers at Play; Hunch Engine Hones In; The Real Risks of RFID 9--9 Charlene O'Hanlon What's on your hard drive? . . . . . . . 10--11 George Neville-Neil Kode Vicious: Phishing for solutions . . 12--13 Charlene O'Hanlon Interview: a conversation with Werner Vogels . . . . . . . . . . . . . . . . . 14--22 Jeff Barr and Luis Felipe Cabrera AI gets a brain . . . . . . . . . . . . 24--29 Ryan Barrows and Jim Traverso Search considered integral . . . . . . . 30--36 Taf Anthias and Krishna Sankar The network's new role . . . . . . . . . 38--46 Andreas Tomek Review of ``Protect your Windows Network: From Perimeter to Data by Jesper Johansson and Steve Riely,'' Addison-Wesley Professional, 2005, \$49.99, ISBN 0-321-33643-7} . . . . . . 42--42 Bernard Kuc Review of ``Open Source Wireless Java Tools Suite by Robert Virkus,'' Apress, 2005, \$39.99, ISBN 1-59059-503-3} . . . 48--48 George Hacken Review of ``High-Assurance Design: Architecting Secure and Reliable Enterprise Applications by Clifford Berg,'' Addison-Wesley Professional, 2005, \$54.99, ISBN 0-321-37577-7} . . . 50--50 Jose Lloret Review of ``Securing Storage: A Practical Guide to SAN and NAS Security by Himanshu Dwivedi,'' Addison-Wesley Professional, 2005, \$49.99, ISBN 0-321-34995-4} . . . . . . . . . . . . . 50--50 Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 52--53 Stan Kelly-Bootle Curmudgeon: The calculus formally known as pi . . . . . . . . . . . . . . . . . 56, 54--55
Charlene O'Hanlon From the editors: Accessorizing . . . . 6--6 John Stanik News 2.0: Measuring the Web's Mood; Software Slump on the Mend? Mobile Gaming for Hackers . . . . . . . . . . . 7--7 Charlene O'Hanlon What's on your hard drive? . . . . . . . 8--8 George Neville-Neil Kode Vicious: Logging on with KV . . . . 9--10 Charlene O'Hanlon Interview: a conversation with Leo Chang of ClickShift . . . . . . . . . . . . . 12--18 Greg Olsen From COM to Common . . . . . . . . . . . 20--26 Michi Henning The rise and fall of CORBA . . . . . . . 28--34 Chris Richardson Untangling Enterprise Java . . . . . . . 36--44 Len Takeuchi ASPs: the integration challenge . . . . 46--52 Michael Laszlo Review of ``Component-Oriented Programming by Andy Ju An Wang and Kai Qian,'' Wiley-Interscience, 2005, \$89.95, ISBN 0-471-64446-3} . . . . . . 59--59 A. Moreno Review of ``Agile Estimating and Planning by Mike Cohn,'' Prentice Hall PTR, 2005, \$44.99, ISBN 0-13-147941-5} 59--59 Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 60--61 Alex E. Bell Curmudgeon: Software development amidst the whiz of silver bullets\ldots . . . . 64, 62--63
Charlene O'Hanlon From the editors: Able bodies . . . . . 8--8 John Stanik News 2.0: Carrying the Torch of Anti-Spam Vigilantism; Taking Constrained Programming to the Next Level; The Human Intelligence Revolution 9--9 Charlene O'Hanlon What's on your hard drive? . . . . . . . 10--10 George Neville-Neil Kode Vicious: Pointless PKI . . . . . . 11--12 Charlene O'Hanlon Interview: a conversation with Jordan Cohen . . . . . . . . . . . . . . . . . 14--23 John Canny The future of human-computer interaction 24--32 James L. Crowley Social perception . . . . . . . . . . . 34--43 Gaetano Borriello The invisible assistant . . . . . . . . 44--49 Jim Christensen and Jeremy Sussman and Stephen Levy and William E. Bennett and Tracee Vetting Wolf and Wendy A. Kellogg Too much information . . . . . . . . . . 50--57 Bayard Kohlhepp Review of ``Windows and Linux Integration: Hands-on Solutions for a Mixed Environment by Jermy Moskowitz and Thomas Boutell,'' Sybex Inc., 2005, \$59.99, ISBN 0-7821-4428-4} . . . . . . 58--58 Melissa C. Stange Review of ``Pro .NET 1.1 Remoting, Reflection, and Threading by David Curran, Fabio Ferracchiati, Syed Gilani, et al.,'' Apress, 2005, \$59.99, ISBN 1-59059-452-5} . . . . . . . . . . . . . 58--58 Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 59--59 Stan Kelly-Bootle Curmudgeon: Like a podcast in the sea: mean ol' LoTech blues . . . . . . . . . 64, 62--63
Charlene O'Hanlon From the editors: Playing by the rules 8--8 Charlene O'Hanlon What's on your hard drive? . . . . . . . 10--10 John Stanik News 2.0: Open Source Gets Mac Attack; Oh No, Not Another Consortium!; Get That Chip out of My Drink . . . . . . . . . . 10--10 George Neville-Neil Kode vicious: Facing the strain . . . . 12--13 Mache Creeger \tt geek@home: Rationalizing a home terabyte server . . . . . . . . . . . . 14--17 Eric Allman Complying with compliance . . . . . . . 18--21 George W. Beeler, Jr. and Dana Gardner A requirements primer . . . . . . . . . 22--26 John Bostick Box their SOXes off . . . . . . . . . . 28--29 J. C. Cannon and Marilee Byers Compliance deconstructed . . . . . . . . 30--37 Tracy Ragan Keeping score in the IT compliance game 38--43 Vladan Jovanovic Review of \em Refactoring Databases: Evolutionary Database Design by Scott Ambler and Pramodkumar Sadalage, Addison-Wesley Professional, 2006, \$49.99, ISBN 0-321-29353-3} . . . . . . 44--44 Radu State Review of \em Software Security: Building Security In by Gary McGraw, Addison-Wesley Professional, 2006, \$49.99, ISBN 0-321-35670-5} . . . . . . 44--44 Greg A. Nolann Curmudgeon: Seeking compliance nirvana 72
Charlene O'Hanlon From the editors: Reality vs. perception 7--7 John Stanik News 2.0: The Mobile Linux Challenge; Google not into Googling; Keeping Online Video Legit . . . . . . . . . . . . . . 8--8 Charlene O'Hanlon Reader files: What's on your hard drive? 9--9 George Neville-Neil Kode vicious: Saddle up, aspiring code jockeys . . . . . . . . . . . . . . . . 10--11 Charlene O'Hanlon Interview: a conversation with David Brown . . . . . . . . . . . . . . . . . 14--23 John R. Mashey The long road to 64 bits . . . . . . . . 24--35 Dan Rubel The heart of eclipse . . . . . . . . . . 36--44 Damon Poole Breaking the major release habit . . . . 46--51 Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 52--52 Stan Kelly-Bootle Curmudgeon: You can look it up: or maybe not . . . . . . . . . . . . . . . . . . 56, 54--55
Charlene O'Hanlon From the editors: The criminal mind . . 7--7 John Stanik News 2.0: Medical Profession Slow to Embrace 'Net\ldots or Is It?; Accessibility Features Not Just for the Disabled; Emerging Markets Embrace 64-bit . . . . . . . . . . . . . . . . . 8--8 Charlene O'Hanlon Reader files: What's on your hard drive? 9--9 George Neville-Neil Kode vicious: Understanding the problem 10--12 Mache Creeger geek@home: Better health care through technology . . . . . . . . . . . . . . . 13--15 Charlene O'Hanlon Interview: a conversation with Douglas W. Jones and Peter G. Neumann . . . . . 16--23 Team Cymru Cybercrime: an epidemic . . . . . . . . 24--35 Eric Allman E-mail authentication: what, why, how? 30--34 Thomas Wadlow and Vlad Gorelik Criminal code: the making of a cybercriminal . . . . . . . . . . . . . 36--41 Daniel E. Geer Playing for keeps . . . . . . . . . . . 42--48 Radu State Review of ``Phishing Exposed'' by Lance James and Joe Stewart, Syngress Publishing, 2005, \$49.95, ISBN 1-59749-030-X} . . . . . . . . . . . . . 50--50 Markus Wolf Review of ``Spring in Action'' by Craig Walls and Ryan Breidenbach, Manning Publications, 2005, \$44.95, ISBN 1-932394-35-4} . . . . . . . . . . . . . 50--50 Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 52--52 Phillip A. Laplante Curmudgeon: The joy of spam . . . . . . 56, 54--55
Charlene O'Hanlon From the Editors: Forward thinking . . . 8--8 John Stanik News 2.0: Fox and the Weasel; Down on the Wireless Farm; Second-Life Commerce Meets First-Life IRS . . . . . . . . . . 10--10 Charlene O'Hanlon What's on your hard drive? . . . . . . . 11--11 George Neville-Neil Kode Vicious: Peerless P2P . . . . . . . 12--13 Charlene O'Hanlon Interview: a conversation with John Hennessy and David Patterson . . . . . . 14--22 Ali-Reza Adl-Tabatabai and Christos Kozyrakis and Bratin Saha Unlocking concurrency . . . . . . . . . 24--33 Simon Crosby and David Brown The virtualization reality . . . . . . . 34--41 Brian Carpenter Better, faster, more secure . . . . . . 42--48 D. Spinellis Review of `Sustainable Software Development: An Agile Perspective' by Kevin Tate, Addison-Wesley Professional, 2005, \$39.99, ISBN 0-321-28608-1} . . . 49--49 Radu State Review of `Hacking Exposed: Web Applications', 2nd edition by Joel Scambray, Mike Shema, and Caleb Sima, McGraw-Hill Osborne Media, 2006, \$49.99, ISBN 0-07-226299-0} . . . . . . 49--49 Charlene O'Hanlon Calendar . . . . . . . . . . . . . . . . 50--50 Stan Kelly-Bootle Curmudgeon: Will the real bots stand up? 56, 52--55
John Stanik News 2.0: Malware --- Quantity over Quality; The Home Robotics Revolution; Roboexotica . . . . . . . . . . . . . . 8--8 John Stanik What's on your hard drive? . . . . . . . 10--10 George Neville-Neil Kode vicious: a license to kode . . . . 12--14 John Stanik Interview: a conversation with Jamie Butler . . . . . . . . . . . . . . . . . 16--23 Vlad Gorelik One step ahead . . . . . . . . . . . . . 24--31 Richard Ford Open vs. closed: which source is more secure? . . . . . . . . . . . . . . . . 32--38 David F. Bacon Realtime garbage collection . . . . . . 40--49 Fernando Berzal Review of `Why Programs Fail: a Guide to Systematic Debugging' by Andreas Zeller, Morgan Kaufmann, 2005, \$54.95, ISBN 1-55860-866-4} . . . . . . . . . . . . . 50--50 Jeffrey Putnam Review of `Model Driven Architecture and Ontology Development' by Dragan Ga\vsevi\'c, Dragan Djuri\'c, and Vladan Devedzic, Springer, 2006, \$59.99, ISBN 3-540-32180-2} . . . . . . . . . . . . . 50--50 John Stanik Calendar . . . . . . . . . . . . . . . . 52--52 Alex Bell Curmudgeon: DOA with SOA . . . . . . . . 56--ff
John Stanik News 2.0: Googlebombs Away; DST: This Year's Y2K?; Linux through Windows . . . 7--7 George Neville-Neil Kode vicious: APIs with an appetite . . 8--10 Mache Creeger Repurposing consumer hardware . . . . . 12--13 John Stanik Interview: a conversation with Cullen Jennings and Doug Wadkins . . . . . . . 14--20 Robert Sparks SIP: basics and beyond . . . . . . . . . 22--33 David A. Bryan and Bruce B. Lowekamp Decentralizing SIP . . . . . . . . . . . 34--41 Jason Fischl and Hannes Tschofenig Making SIP make cents . . . . . . . . . 42--49 Martin J. Steinmann Unified communications with SIP . . . . 50--55 Shantanu Bhattacharya Review of `Essential Software Architecture' by Ian Gorton, Springer-Verlag New York Inc., Secaucus, NJ, 2006, \$59.95, ISBN 3-540-28713-2} 56--56 Brian D. Goodman Review of `The Geek Gap: Why Business and Technology Professionals Don't Understand Each Other and Why They Need Each Other to Survive' by Bill Pfleging and Minda Zetlin, Prometheus Books, 2006, \$25.00, ISBN 1-59102-415-3} . . . 56--56 John Stanik Calendar . . . . . . . . . . . . . . . . 58--58 Stan Kelly-Bootle Curmudgeon: As big as a barn? . . . . . 64, 62--63
James Maurer From the Editors: Going forward . . . . 8--8 John Stanik News 2.0: Virtualization Reconsidered; The Power of PS3; Anti-P2P Software Targets Universities . . . . . . . . . . 10--10 George Neville-Neil Kode vicious: Advice to a newbie . . . . 12--14 John Stanik Interview: a conversation with Cory Doctorow and Hal Stern . . . . . . . . . 16--23 Paul Vixie DNS complexity . . . . . . . . . . . . . 24--29 Daniel E. Geer The evolution of security . . . . . . . 30--35 Philip Papadopoulos and Greg Bruno and Mason Katz Beyond Beowulf clusters . . . . . . . . 36--43 S. Balaraman Review of `Pro JSF and Ajax: Building Rich Internet Components' by Jonas Jacobi and John Fallows, Apress, 2006, \$49.99, ISBN 1-59059-580-7} . . . . . . 44--44 Radu State Review of `Embedded Linux Primer: A Practical Real-world Approach' by Christopher Hallinan, Prentice Hall PTR, 2006, \$44.99, ISBN 0-13-167984-8} . . . 44--44 John Stanik Calendar . . . . . . . . . . . . . . . . 46--46 Stan Kelly-Bootle Curmudgeon: Ode or code?: programmers be used! . . . . . . . . . . . . . . . . . 52, 48--51
George V. Neville-Neil Kode vicious: KV the loudmouth . . . . . 8--10 Mache Creeger geek@home: Embracing wired networks . . 12--15 John Stanik Interview: a conversation with Michael Stonebraker and Margo Seltzer . . . . . 16--23 Michi Henning API design matters . . . . . . . . . . . 24--36 Bob Toxen The seven deadly sins of Linux security 38--47 John O'Hara Toward a commodity enterprise middleware 48--55 Rafael Corchuelo Review of `Expert VB 2005 Business Objects' (second edition) by Rockford Lhotka, Apress, 2006, \$59.99, ISBN 1-59059-631-5} . . . . . . . . . . . . . 56--56 Will Wallace Review of `Designing with Web Standards' (second edition) by Jeffrey Zeldman, Peachpit Press, 2006, \$44.99, ISBN 0-321-38555-1} . . . . . . . . . . . . . 56--56 John Stanik Calendar . . . . . . . . . . . . . . . . 58--58 Stan Kelly-Bootle Curmudgeon: Alloneword . . . . . . . . . 64, 61--63
John Stanik Letters: Kudos to Curmudgeon; Long Live the Wire . . . . . . . . . . . . . . . . 8--8 George V. Neville-Neil Kode vicious: Gettin' your head straight 9--10 John Stanik Interview: a conversation with Joel Spolsky . . . . . . . . . . . . . . . . 12--20 George V. Neville-Neil Building secure Web applications . . . . 22--26 Naveen Agarwal and Scott Renfro and Arturo Bejar Phishing forbidden . . . . . . . . . . . 28--32 Vikram V. Ingleshwar Usability testing for the Web . . . . . 34--37 Philippe Kruchten Voyage in the agile memeplex . . . . . . 38--44 Shantanu Bhattacharya Review of `Enterprise Service-Oriented Architectures: Concepts, Challenges, Recommendations' by James McGovern, Oliver Sims, Ashish Jain, and Mark Little, Springer-Verlag, 2006, \$59.95, ISBN 1-4020-3704-X} . . . . . . . . . . 46--46 Andrea Paramithiotti Review of `Hitchhiker's Guide to Visual Studio and SQL Server: Best Practice Architectures and Examples,' 7th edition (Microsoft Windows Server System Series) by William Vaugh and Peter Blackburn, Addison-Wesley Professional, 2006, \$59.99, ISBN 0-321-24362-5} . . . . . . 46--46 John Stanik Calendar . . . . . . . . . . . . . . . . 48--48 Stan Kelly-Bootle Curmudgeon: Some swans are black . . . . 52, 49--51
Alex Bell Opinion: Ground control to Architect Tom \ldots . . . . . . . . . . . . . . . . . 8--10 George Neville-Neil Kode vicious: The next big thing . . . . 11--12 John Stanik Interview: a conversation with Jeff Bonwick and Bill Moore . . . . . . . . . 13--19 Garth Goodson and Sai Susharla and Rahul Iyer Standardizing storage clusters . . . . . 20--27 Jon Elerath Hard disk drives: the good, the bad and the ugly! . . . . . . . . . . . . . . . 28--37 Kostadis Roussos Storage virtualization gets smart . . . 38--44 S. Balaraman Review of `Beginning POJOs: From Novice to Professional' by Brian Sam-Bodden, Apress, 2006, \$39.99, ISBN 1-59059-596-3} . . . . . . . . . . . . . 45--45 Diego R. Llanos Review of `Grid Computing Security' by Anirban Chakrabarti, Springer, 2007, \$69.96, ISBN 3-540-44492-0} . . . . . . 45--45 John Stanik Calendar . . . . . . . . . . . . . . . . 46--46 Stan Kelly-Bootle Curmudgeon: The code delusion . . . . . 52, 49--51
George V. Neville-Neil Kode vicious: Take a freaking measurement! . . . . . . . . . . . . . . 7--8 John Stanik Interview: a conversation with Mary Lou Jepsen . . . . . . . . . . . . . . . . . 9--15 Matthew Garrett Powering down . . . . . . . . . . . . . 16--21 Simson L. Garfinkel Document & media exploitation . . . . . . 22--30 David Sohn Understanding DRM . . . . . . . . . . . 32--39 Mark Callow and Paul Beardow and David Brittain Big games, small screens . . . . . . . . 40--50 Marc S. Gibian Review of `Practical Subversion', Second Edition, by Daniel Berlin and Garrett Rooney, Apress, 2006, \$34.99, ISBN 1-59059-753-2} . . . . . . . . . . . . . 51--51 O. Lecarme Review of `Pro Drupal Development', by John VanDyk and Matt Westgate, Apress 2007, \$44.99, ISBN 1-59059-755-9} . . . 51--51 John Stanik Calendar . . . . . . . . . . . . . . . . 52--52 Stan Kelly-Bootle Curmudgeon: Use it or lose it . . . . . 56, 53--55
George Neville-Neil Kode vicious: Poisonous programmers . . 5--6 John Stanik Interview: a conversation with Jason Hoffman . . . . . . . . . . . . . . . . 7--13 Tom Killalea Meet the virts . . . . . . . . . . . . . 14--18 Werner Vogels Beyond server consolidation . . . . . . 20--26 Ulrich Drepper The cost of virtualization . . . . . . . 28--35 Scot Rixner Network virtualization: breaking the performance barrier . . . . . . . . . . 36--ff Peter Kriens How OSGi changed my life . . . . . . . . 44--51 Stan Kelly-Bootle Curmudgeon: All things being equal? . . 56, 54--55
James Maurer From the Editors: Going digital . . . . 7--7 George Neville-Neil Kode vicious: Latency and livelocks . . 8--10 John Stanik Interview: a conversation with Kurt Akeley and Pat Hanrahan . . . . . . . . 11--17 Kayvon Fatahalian and Mike Houston GPUs: a closer look . . . . . . . . . . 18--28 Chas. Boyd Data-parallel computing . . . . . . . . 30--39 John Nickolls and Ian Buck and Michael Garland and Kevin Skadron Scalable parallel programming with CUDA 40--53 William Mark Future graphics architectures . . . . . 54--64 Jose M. Ramirez Review of `Enterprise Ajax: Strategies for Building High-performance Web Applications' by David Johnson, Alexei White, and Andre Charland, Prentice Hall PTR, 2008, \$39.99, ISBN 0-13-224206-0} 66--66 Howard Whitston Review of `Essential RenderMan' by Ian Stephenson, Springer-Verlag New York, Inc., 2008, \$39.95, ISBN 1-84628-344-2} 66--66 John Stanik Calendar . . . . . . . . . . . . . . . . 68--68 Stan Kelly-Bootle Curmudgeon: Solomon's sword beats Occam's razor . . . . . . . . . . . . . 72, 69--71
James Maurer From the editors: a New Era . . . . . . 7--7 George Neville-Neil Kode vicious: The Virtue of Paranoia . . 7--8 Terry Coatta Interview: a conversation with Erik Meijer and Jose Blakeley . . . . . . . . 9--15 Craig Russell Bridging the Object-Relational Divide 18--28 Chris Richardson ORM in Dynamic Languages . . . . . . . . 28--37 Michael Keith and Randy Stafford Exposing the Cache ORM . . . . . . . . . 38--47 Dan Pritchett BASE: An ACID Alternative . . . . . . . 48--55 Eric Allman A Tribute to Jim Gray . . . . . . . . . 56--57 Donna Carnes Ode to a Sailor . . . . . . . . . . . . 58--62 Jim Gray Distributed Computing Economics . . . . 63--68 Harry J. Foxwell Review of `The Definitive Guide to the Xen Hypervisor' (Prentice Hall Open Source Software Development Series), David Chisnall, Prentice Hall PTR, 2007, \$49.99, ISBN 0-13-234971-X} . . . . . . 69--69 Jeffrey Putnam Review of `Practical MythTV: Building a PVR and Media Center PC', Stewart Smith and Michael Still, Apress, 2007, \$29.99, ISBN 1-59059-779-6} . . . . . . 69--69 Stan Kelly-Bootle Curmudgeon: There's a Lot of It About 72--ff
George Neville-Neil Kode vicious: Sizing your System . . . . 6--7 John Stanik Interview: a conversation with Steve Bourne, Eric Allman, and Bryan Cantrill 8--15 Bryan Cantrill A Pioneer's Flash of Insight . . . . . . 16--17 Jim Gray and Bob Fitzgerald Flash Disk Opportunity for Server Applications . . . . . . . . . . . . . . 18--23 Adam Leventhal Flash Storage Today . . . . . . . . . . 24--30 Mark Moshayedi and Patrick Wilkison Enterprise SSDs . . . . . . . . . . . . 32--39 Goetz Graefe The Five-minute Rule 20 Years Later: and How Flash Memory Changes the Rules . . . 40--52 David B. Henderson Review of \em Botnet Detection: Countering the Largest Security Threat (Advances in Information Security) Wenke Lee, Cliff Wang, David Dagon, Springer-Verlag New York Inc., 2007, \$99.00, ISBN: 0-387-68766-1} . . . . . 53--53 Annika Hinze Review of \em RailsSpace: Building a Social Networking Website with Ruby on Rails, (Addison-Wesley Professional Ruby Series) Michael Hartl, Aurelius Prochazka, Addison-Wesley Professional, 2007, \$44.99, ISBN 0-321-48079-1} . . . 53--53 John Stanik Calendar . . . . . . . . . . . . . . . . 54--54 Stan Kelly-Bootle Curmudgeon: The Fabrication of Reality 56--58
George Neville-Neil Kode vicious: Beautiful Code Exists, If You Know Where to Look . . . . . . . . . 4--7 John Stanik Interview: a Conversation with Steve Bourne, Eric Allman, and Bryan Cantrill 8--15 Bryan Cantrill and Jeff Bonwick Real-world Concurrency . . . . . . . . . 16--25 Jim Larson Erlang for Concurrent Programming . . . 18--23 Ulrich Drepper Parallel Programming with Transactional Memory . . . . . . . . . . . . . . . . . 38--45 Calin Cascaval and Colin Blundell and Maged Michael and Harold W. Cain and Peng Wu and Stefanie Chiras and Siddhartha Chatterjee Software Transactional Memory: why is it only a research toy? . . . . . . . . . . 46--58 David G. Hill Review of \em Eating the IT Elephant: Moving from Greenfield Development to Brownfield (1st ed.), IBM Press, 2008, \$29.99, ISBN 0-13-713012-0} . . . . . . 59--59 David Naugler Review of \em Pro WPF in C# 2008: Windows Presentation Foundation with .NET 3.5, (2nd ed.),' Apress, 2008, \$54.99, ISBN 1-59059-955-1} . . . . . . 59--59 John Stanik Calendar . . . . . . . . . . . . . . . . 60--60 Stan Kelly-Bootle Curmudgeon: Affine Romance . . . . . . . 61--63
George Neville-Neil Kode vicious: Get Real about Realtime 6--9 Tom Killalea Building Scalable Web Services . . . . . 10--13 Werner Vogels Eventually Consistent . . . . . . . . . 14--19 Tom Leighton Improving Performance on the Internet 20--29 Steve Souders High Performance Web Sites . . . . . . . 30--37 Steve Bourne CTO Roundtable STORAGE . . . . . . . . . 38--45 Erik Wilde and Robert J. Glushko XML Fever . . . . . . . . . . . . . . . 46--53 J. Miller Book Review: Practical API Design: Confessions of a Java Framework Architect (1st edition), Jaroslav Tulach, Apress, 2008, \$74.99, ISBN: 978-1-4302-0973-7} . . . . . . . . . . . 54--54 Markus Wolf Book Review: Concurrent and Real-time Programming in Ada (3rd edition), Alan Burns, Andy Wellings, Cambridge University Press, 2007, \$75.00, ISBN: 978-0-521-86697-2} . . . . . . . . . . . 54--54 John Stanik Calendar . . . . . . . . . . . . . . . . 55--55
George Neville-Neil Debugging Devices . . . . . . . . . . . 6--9 Jim Waldo Scaling in Games & Virtual Worlds . . . . 10--16 Walker White and Christoph Koch and Johannes Gehrke and Alan Demers Better Scripts, Better Games . . . . . . 18--25 George V. Neville-Neil Code Spelunking Redux . . . . . . . . . 26--33 Mache Creeger CTO roundtable storage: part two . . . . 34--40 David Bellin Review of \em The Rails Way by Obie Fernandez, Addison-Wesley Professional, 2007, \$49.99, ISBN: 978-0-321-44561-2} 41--41 David Naugler Review of \em Pro LINQ Object Relational Mapping in C# 2008 by Vijay Mehta, Apress, 2008, \$49.99, ISBN: 978-1-59059-965-5} . . . . . . . . . . . 41--41 John Stanik Calendar . . . . . . . . . . . . . . . . 42--42
George V. Neville-Neil Kode vicious: Pride and Prejudice: (The \em Vasa) . . . . . . . . . . . . . . . 6--7 John Stanik Interview: a Conversation with Van Jacobson . . . . . . . . . . . . . . . . 8--16 Mike Shapiro Purpose-Built Languages . . . . . . . . 18--24 Mache Creeger CTO roundtable: Virtualization: Part One 26--35 Benjamin Boer The Obama Campaign: a Programmer's Perspective . . . . . . . . . . . . . . 36--39 S. Balaraman Book review: Review of \em Pro Web 2.0 Application Development with GWT by Jeff Dwyer, Apress, 2008, \$44.99, ISBN 978-1-59059-985-3} . . . . . . . . . . . 40--40 Alessandro Berni Review of \em Wireless Ad Hoc and Sensor Networks (1st ed) by Houda Labiod, John Wiley & Sons, Inc., 2008, \$165.00, ISBN 1-84821-003-5} . . . . . . . . . . . . . 40--40 John Stanik Calendar . . . . . . . . . . . . . . . . 41--41 Stan Kelly-Bootle Curmudgeon: The Flaws of Nature . . . . 42--45 Jeff Norwalk Making the Move to AJAX . . . . . . . . 1:1--1:?? Peter Christy Commentary: a Trip Without a Roadmap . . 2:1--2:?? Eric Schrock Debugging AJAX in Production . . . . . . 3:1--3:??
James Maurer Introducing \ldots \tt acmqueue . . . . 5--5 George V. Neville-Neil Kode Vicious: Don't be Typecast as a Software Developer . . . . . . . . . . . 6--9 Bryan Cantrill Interview: a Conversation with Arthur Whitney . . . . . . . . . . . . . . . . 12--13 Thomas Wadlow and Vlad Gorelik Security in the Browser . . . . . . . . 40--41 Niels Provos and Moheeb Abu Rajab and Panayiotis Mavrommatis Cybercrime 2.0: When the Cloud Turns Dark . . . . . . . . . . . . . . . . . . 46--47 Ian Foster and Savas Parastatidis and Paul Watson and Mark McKeown How Do I Model State? Let Me Count the Ways . . . . . . . . . . . . . . . . . . 54--55 Matt Zandstra and Robert Martin Book Reviews: \em PHP Objects, Patterns, and Practice (second edition), Matt Zandstra, Apress, 2007, \$44.99, ISBN 1-59059-909-8}, {{\em Clean Code: A Handbook of Agile Software Craftsmanship}, Robert Martin, Prentice Hall PTR, 2008, \$42.99, ISBN 0-13-235088-2 . . . . . . . . . . . . . 75--75 Anonymous Calendar . . . . . . . . . . . . . . . . 76--76
Charles Beeler and Craig Partridge Opinion: All-Optical Computing and All-Optical Networks are Dead . . . . . 10--11 Jonathan M. Smith Fighting Physics: a Tough Battle . . . . 20--21 Mike O'Dell Network Front-end Processors, Yet Again 28--29
George V. Neville-Neil Whither Sockets? . . . . . . . . . . . . 34--35
Stan Kelly-Bootle Curmudgeon: One Peut-Être, Two Peut-Être, Three Peut-Être, More . . . . . . . . . . 77--80
Werner Vogels and Greg Olsen and Lew Tucker and Greg Badros and Geir Ramleth and Steve Bourne CTO roundtable: Cloud Computing . . . . 1:1--1:18 Mache Creeger Cloud Computing: An Overview: Part Two 2:1--2:?? Charles Reis and Adam Barth and Carlos Pizano Browser Security: Lessons from Google Chrome . . . . . . . . . . . . . . . . . 3:1--3:8
Adam Jacobs The Pathologies of Big Data . . . . . . 1:1--1:10
Marshall Kirk McKusick and Sean Quinlan Case Study: GFS: Evolution on Fast-forward . . . . . . . . . . . . . . 10
Whitfield Diffie and Susan Landau Communications Surveillance: Privacy and Security at Risk . . . . . . . . . . . . 10 Pat Hanrahan A Conversation with David Shaw . . . . . 20--21 Pat Hanrahan A Conversation with David Shaw --- Audio Clip . . . . . . . . . . . . . . . . . . ??
Jim Waldo and Alan Ramos and Weina Scott and William Scott and Doug Lloyd and Katherine O'Leary A Threat Analysis of RFID Passports . . 10 Matthew T. Dougherty and Michael J. Folk and Erez Zadok and Herbert J. Bernstein and Frances C. Bernstein and Kevin W. Eliceiri and Werner Benger and Christoph Best Unifying Biological Image Formats with HDF5 . . . . . . . . . . . . . . . . . . 20 James C. Phillips and John E. Stone Probing Biomolecular Machines with Graphics Processors . . . . . . . . . . 30 Samantha Kleinberg and Bud Mishra Metamorphosis: the Coming Transformation of Translational Systems Biology . . . . 40 Paul Stachour and David Collier-Brown You Don't Know Jack About Software Maintenance . . . . . . . . . . . . . . 50 George Neville-Neil Kode Vicious: Merge Early, Merge Often 60--62
Paul Vixie What DNS Is Not . . . . . . . . . . . . 10 Stephen Petschulat Other People's Data . . . . . . . . . . 20 Alexandra Fedorova and Juan Carlos Saez and Daniel Shelepov and Manuel Prieto Maximizing Power Efficiency with Asymmetric Multicore Systems . . . . . . 30
Stan Kelly-Bootle Curmudgeon: Some Rules and Restrictions May Apply . . . . . . . . . . . . . . . 1--3 Julian Hyde Data in Flight . . . . . . . . . . . . . 20 Adam Leventhal Triple-Parity RAID and Beyond . . . . . 30 George Neville-Neil Kode Vicious: Standards Advice . . . . . 40--43
Eric Saxe Power-Efficient Software . . . . . . . . 10
David Brown Interview: a Conversation with Steve Furber . . . . . . . . . . . . . . . . . 1--8 George Neville-Neil Kode Vicious: Commitment Issues . . . . 20--22 David J. Brown and Charles Reams Toward Energy-Efficient Computing . . . 30 Mache Creeger CTO Roundtable: Malware Defense . . . . 40
Andy Woods Cooling the Data Center . . . . . . . . 10 George Neville-Neil Kode Vicious: Broken Builds . . . . . . 20 Anonymous A Conversation with Jeff Heer, Martin Wattenberg, and Fernanda Viégas . . . . . 1--8 Peter Phillips Enhanced Debugging with Traces . . . . . 1--6
George Phillips Simplicity Betrayed . . . . . . . . . . 10 Dave Durkee Why Cloud Computing Will Never Be Free 1--10 Julien Ridoux and Darryl Veitch Principles of Robust Timing over the Internet . . . . . . . . . . . . . . . . 1--14 Jeffrey Heer and Michael Bostock and Vadim Ogievetsky A Tour through the Visualization Zoo . . 40 George Neville-Neil Kode Vicious: Avoiding Obsolescence . . 50
Dustin Owens Securing Elasticity in the Cloud . . . . 1--7 Jeffrey Heer and Michael Bostock and Vadim Ogievetsky A Tour through the Visualization Zoo . . 20 Brendan Gregg Visualizing System Latency . . . . . . . 30
George Neville-Neil Kode Vicious: Collecting Counters . . . 10 Poul-Henning Kamp You're Doing It Wrong . . . . . . . . . 20 Eugene Loh The Ideal HPC Programming Language . . . 30
Robert DeLine and Gina Venolia and Kael Rowan Software Development with Code Maps . . 10 Mache Creeger Moving to the Edge: An ACM CTO Roundtable on Network Virtualization . . 20 George V. Neville-Neil Lessons from the Letter . . . . . . . . 30 Mache Creeger Moving to the Edge: CTO Roundtable Overview . . . . . . . . . . . . . . . . 40
Steve Chessin Injecting Errors for Fun and Profit . . 10 Stephen V. Cantrill Computers in Patient Care: The Promise and the Challenge . . . . . . . . . . . 20 George Neville-Neil Kode Vicious: a Paucity of Ports . . . . 30
Cary Millsap Thinking Clearly about Performance . . . 1--10 Clem Cole and Russell Williams Photoshop Scalability: Keeping It Simple 20 Kevin Montagne Tackling Architectural Complexity with Modeling . . . . . . . . . . . . . . . . 30 Stan Kelly-Bootle Curmudgeon: Facing an Uncertain Past . . 40
David S. H. Rosenthal Keeping Bits Safe: How Hard Can It Be? 1--10
Mache Creeger The Theft of Business Innovation: An ACM--BCS Roundtable on Threats to Global Competitiveness . . . . . . . . . . . . 10 Mache Creeger The Theft of Business Innovation: Overview . . . . . . . . . . . . . . . . 20 Mache Creeger A Conversation with Ed Catmull . . . . . 30 Evangelos Kotsovinos Virtualization: Blessing or Curse? . . . 40 Terry Coatta and Julian Gosper UX Design and Agile: a Natural Fit? . . 50
Eben M. Haber and Eser Kandogan and Paul Maglio Collaboration in System Administration 10 George V. Neville-Neil Bound by the Speed of Light . . . . . . 20 Thomas A. Limoncelli A Plea to Software Vendors from Sysadmins --- 10 Do's and Don'ts . . . . 30
Christina Lear System Administration Soft Skills . . . 10
Stan Kelly-Bootle Two Books Alike in Dignity . . . . . . . 10 Poul-Henning Kamp B.Y.O.C. (1,342 Times and Counting) . . 20 Jonathan Parri and Daniel Shapiro and Miodrag Bolic and Voicu Groza Returning Control to the Programmer: SIMD Intrinsics for Virtual Machines . . 30
George Neville-Neil Porting with Autotools . . . . . . . . . 10
Anonymous Jim Gray --- A Talk with THE SQL Guru and Architect . . . . . . . . . . . . . 40 Poul-Henning Kamp The One-second War (What Time Will You Die?) . . . . . . . . . . . . . . . . . 10 Andre Charland and Brian LeRoux Mobile Application Development: Web vs. Native . . . . . . . . . . . . . . . . . 20 Michael Rys Scalable SQL . . . . . . . . . . . . . . 30
George Neville-Neil Storage Strife . . . . . . . . . . . . . 10 Roberto Ierusalimschy and Luiz Henrique de Figueiredo and Waldemar Celes Passing a Language through the Eye of a Needle . . . . . . . . . . . . . . . . . 20 David Rosenthal Deduplicating Devices Considered Harmful 30
Debasish Ghosh DSL for the Uninitiated . . . . . . . . 10
Oren Eini The Pain of Implementing LINQ Providers 10
Mache Creeger ACM CTO Roundtable on Mobile Devices in the Enterprise . . . . . . . . . . . . . 10 Mache Creeger Mobile Devices in the Enterprise: CTO Roundtable Overview . . . . . . . . . . 20 George Neville-Neil How to Improve Security? . . . . . . . . 30
Poul-Henning Kamp The Software Industry IS the Problem: The time has come for software liability laws . . . . . . . . . . . . . . . . . . 10
David Pacheco Postmortem Debugging in Dynamic Environments . . . . . . . . . . . . . . 12 G. Bruce Berriman and Steven L. Groom How Will Astronomy Archives Survive the Data Tsunami? . . . . . . . . . . . . . 21 George Neville-Neil Wanton Acts of Debuggery . . . . . . . . 30
Robert Green and Henry Ledgard Coding Guidelines: Finding the Art in the Science . . . . . . . . . . . . . . 10
Vint Cerf and Van Jacobson and Nick Weaver and Jim Gettys BufferBloat: What's Wrong with the Internet? . . . . . . . . . . . . . . . 10 George Neville-Neil Code Rototilling . . . . . . . . . . . . 20
George V. Neville-Neil The Network Protocol Battle: a tale of hubris and zealotry . . . . . . . . . . 10
Jim Gettys Home Bufferbloat Demonstration Videos 10
Eric Allman Managing Technical Debt . . . . . . . . 10
Andrew Danowitz and Kyle Kelley and James Mao and John P. Stevenson and Mark Horowitz CPU DB: Recording Microprocessor History 18
Dennis Abts and Bob Felderman A Guided Tour through Data-Center Networking . . . . . . . . . . . . . . . 10
George Neville-Neil A Nice Piece of Code . . . . . . . . . . 10
Manuel Serrano and Gérard Berry Multitier Programming in Hop . . . . . . 10
George V. Neville-Neil Can More Code Mean Fewer Bugs? . . . . . 10
Marshall Kirk McKusick Disks from the Perspective of a File System . . . . . . . . . . . . . . . . . 1--3
Michael Cornwell Anatomy of a Solid-State Drive . . . . . ?? Aiman Erbad and Charles Krasic Sender-side Buffers and the Case for Multimedia Adaptation . . . . . . . . . ?? George Neville-Neil Queue Portrait: Robert Watson . . . . . ??
Anonymous The Web Won't Be Safe or Secure until We Break It . . . . . . . . . . . . . . . . ??
Anonymous Node Summit: The Importance of Cross Platform . . . . . . . . . . . . . . . . ??
Arun Kumar and Feng Niu and Christopher Ré Hazy: Making it Easier to Build and Maintain Big-data Analytics . . . . . . 1--17 Kate Matsudaira Making the Mobile Web Faster . . . . . . 1--9 George Neville-Neil Kode Vicious: Divided by Division . . . 1--3 Robert N. M. Watson A Decade of OS Access-control Extensibility . . . . . . . . . . . . . 1--22
Brian Beckman and Erik Meijer The Story of the Teapot in DHTML . . . . 1--10
Latanya Sweeney Discrimination in Online Ad Delivery . . 10
George Neville-Neil Kode Vicious: Cherry-picking and the Scientific Method . . . . . . . . . . . 10
Terry Coatta Queue Portrait: Kate Matsudaira . . . . 10
George Neville-Neil Kode Vicious: The Naming of Hosts is a Difficult Matter; Also, the perils of premature rebooting . . . . . . . . . . 10
Poul-Henning Kamp More Encryption Is Not the Solution . . 10
George Neville-Neil Kode Vicious: A Lesson in Resource Management . . . . . . . . . . . . . . . 10:10--10:12
Neil Mitchell Leaking Space . . . . . . . . . . . . . 1--14
George Neville-Neil Kode Vicious: Bugs and Bragging Rights 1--3
Alex E. Bell The Software Inferno . . . . . . . . . . 10
Nick Feamster and Jennifer Rexford and Ellen Zegura The Road to SDN . . . . . . . . . . . . ?? Zachary Hensley and Jibonananda Sanyal and Joshua New Provenance in Sensor Data Management . . ?? Anonymous Node at LinkedIn: The Pursuit of Thinner, Lighter, Faster . . . . . . . . ?? George Neville-Neil Kode Vicious: This is the Foo Field . . ?? Poul-Henning Kamp Center Wheel for Success . . . . . . . . 10
Robert Sproull and Jim Waldo The API Performance Contract . . . . . . 10 Andi Kleen Scaling Existing Lock-based Applications with Lock Elision . . . . . . . . . . . 20 Wojciech Golab and Muntasir R. Rahman and Alvin AuYoung and Kimberly Keeton and Xiaozhou (Steve) Li Eventually Consistent: Not What You Were Expecting? . . . . . . . . . . . . . . . 30
Paul Vixie Rate-limiting State . . . . . . . . . . 10 Ivar Jacobson and Pan-Wei Ng and Ian Spence and Paul E. McMahon Major-league SEMAT: Why Should an Executive Care? . . . . . . . . . . . . 20 George Neville-Neil Kode Vicious: The Logic of Logging . . . 30 Christoph Paasch and Olivier Bonaventure Multipath TCP . . . . . . . . . . . . . 40 Erik Meijer Evolution of Javascript Revisited . . . 50 Erik Meijer Why Large Scale Mobile and E-Commerce Apps use \tt Node.js . . . . . . . . . . 60 Eran Hammer Notes from the Battlefield (\tt Node.js at Walmart) . . . . . . . . . . . . . . 70 Anonymous Release the Kraken: a Story of \tt Node.js in the Enterprise (PayPal) . . . 80 Anonymous Riding the N(ode) Train (Groupon) . . . 90 Manish Vachharajani Embedding \tt Node.js into a High-performance Network Datapath . . . 100 Anonymous \tt Node.js in the Digital Media Universe . . . . . . . . . . . . . . . . 110
Lucian Carata and Sherif Akoush and Nikilesh Balakrishnan and Thomas Bytheway and Ripduman Sohan and Margo Seltzer and Andy Hopper A Primer on Provenance . . . . . . . . . 10 Poul-Henning Kamp Please Put OpenSSL Out of Its Misery . . 20 Wyatt Lloyd and Michael J. Freedman and Michael Kaminsky and David G. Andersen Don't Settle for Eventual Consistency 30 Bob Toxen The NSA and Snowden: Securing the All-Seeing Eye . . . . . . . . . . . . . 40
George Neville-Neil Kode Vicious: Forked Over . . . . . . . 10 Erik Meijer The Curse of the Excluded Middle . . . . 20 Andy Gill Domain-specific Languages and Code Synthesis Using Haskell . . . . . . . . 30 Bo Joel Svensson and Mary Sheeran and Ryan Newton Design Exploration through Code-generating DSLs . . . . . . . . . . 40
Mike Bland Finding More Than One Worm in the Apple 10 Terry Coatta and Michael Donat and Jafar Husain Automated QA Testing at EA: Driven by Events . . . . . . . . . . . . . . . . . 20 Thomas Wadlow Who Must You Trust? . . . . . . . . . . 30
Poul-Henning Kamp The Bikeshed: Quality Software Costs Money --- Heartbleed Was Free . . . . . 10 George Neville-Neil Kode Vicious: Outsourcing Responsibility 20 Michael J. Lutz and J. Fernando Naveda and James R. Vallino Undergraduate Software Engineering: Addressing the Needs of Professional Software Development . . . . . . . . . . 30 Mark Cavage and David Pacheco Bringing Arbitrary Compute to Authoritative Data . . . . . . . . . . . 40
Vinton G. Cerf ACM and the Professional Programmer . . 10 Peter Bailis and Kyle Kingsbury The Network is Reliable . . . . . . . . 20 Jon P. Daries and Justin Reich and Jim Waldo and Elise M. Young and Jonathan Whittinghill and Daniel Thomas Seaton and Andrew Dean Ho and Isaac Chuang Privacy, Anonymity, and Big Data in the Social Sciences . . . . . . . . . . . . 30 Christoph Kern Securing the Tangled Web . . . . . . . . 40
Ben Laurie Certificate Transparency . . . . . . . . 10 Sharon Goldberg Why Is It Taking So Long to Secure Internet Routing? . . . . . . . . . . . 20 Axel Arnbak and Hadi Asghari and Michel Van Eeten and Nico Van Eijk Security Collapse in the HTTPS Market 30
George Neville-Neil Port Squatting . . . . . . . . . . . . . 10 Alex Liu JavaScript and the Netflix User Interface . . . . . . . . . . . . . . . 20 John T. Richards and Jonathan Brezin and Calvin B. Swart and Christine A. Halverson Productivity in Parallel Programming: a Decade of Progress . . . . . . . . . . . 30 Ellen Chisa Evolution of the Product Manager . . . . 40
Erik Meijer and Vikram Kapoor The Responsive Enterprise: Embracing the Hacker Way . . . . . . . . . . . . . . . 10 David Chisnall There's No Such Thing as a General-purpose Processor . . . . . . . 20 Ivar Jacobson and Ed Seidewitz A New Software Engineering . . . . . . . 30
George Neville-Neil Too Big to Fail . . . . . . . . . . . . 10 Rick Richardson Disambiguating Databases . . . . . . . . 20 Geetanjali Sampemane Internal Access Controls . . . . . . . . 30 Davidlohr Bueso Scalability Techniques for Practical Synchronization Primitives . . . . . . . 40
Poul-Henning Kamp HTTP\slash 2.0 --- The IETF is Phoning It In . . . . . . . . . . . . . . . . . 10 Harlan Stenn Securing the Network Time Protocol . . . 20 Paul Vixie Go Static or Go Home . . . . . . . . . . 30 Robert V. Binder and Bruno Legeard and Anne Kramer Model-based Testing: Where Does It Stand? . . . . . . . . . . . . . . . . . 40 Dave Long META II: Digital Vellum in the Digital Scriptorium . . . . . . . . . . . . . . 50
Poul-Henning Kamp HTTP/2.0 --- The IETF is Phoning It In 10 George Neville-Neil Kode Vicious: Raw Networking . . . . . . 20 Paul Vixie Go Static or Go Home . . . . . . . . . . 30
Spencer Rathbun Parallel Processing with Promises . . . 10 Justin Sheehy There is No Now . . . . . . . . . . . . 20 \vSt\vepán Davidovi\vc and Kavita Guliani Reliable Cron across the Planet . . . . 30 Erik Meijer and Kevin Millikin and Gilad Bracha Spicing Up Dart with Side Effects . . . 40
Daniel C. Wang From the EDVAC to WEBVACs . . . . . . . 10 Phelim Dowling and Kevin McGrath Using Free and Open Source Tools to Manage Software Quality . . . . . . . . 20 Kate Matsudaira The Science of Managing Data Science . . 30 Andrew Brook Evolution and Practice: Low-latency Distributed Applications in Finance . . 40
George Neville-Neil Kode Vicious: Lazarus Code . . . . . . . 10 Neil Gunther and Paul Puglia and Kristofer Tomasette Hadoop Superlinear Scalability . . . . . 20 Rich Harris Dismantling the Barriers to Entry . . . 30
George Neville-Neil Kode Vicious: Hickory Dickory Doc: On null encryption and automated documentation . . . . . . . . . . . . . 10 Arie van Deursen Beyond Page Objects: Testing Web Applications with State Objects . . . . 20 Spence Green and Jeffrey Heer and Christopher D. Manning Natural Language Translation at the Intersection of AI and HCI . . . . . . . 30
Philip Maddox Testing a Distributed System . . . . . . 10 Thanumalayan Sankaranarayana Pillai and Vijay Chidambaram and Ramnatthan Alagappan and Samer Al-Kiswany and Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau Crash Consistency . . . . . . . . . . . 20
George Neville-Neil and Steve Bourne Version Status: Still Finding the Right Questions . . . . . . . . . . . . . . . 10 Tyler McMullen It Probably Works . . . . . . . . . . . 15 Olivia Angiuli and Joe Blitzstein and Jim Waldo How to De-identify Your Data . . . . . . 20 Ben Maurer Fail at Scale . . . . . . . . . . . . . 30 Kate Matsudaira Lean Software Development --- Building and Shipping Two Versions . . . . . . . 40 Thomas A. Limoncelli Automation Should Be Like Iron Man, Not Ultron . . . . . . . . . . . . . . . . . 50 Taylor Savage Componentizing the Web . . . . . . . . . 60 Fabien Gaud and Baptiste Lepers and Justin Funston and Mohammad Dashti and Alexandra Fedorova and Vivien Quéma and Renaud Lachaize and Mark Roth Challenges of Memory Management on Modern NUMA System . . . . . . . . . . . 70 George Neville-Neil Kode Vicious: Pickled Patches . . . . . 90 Amin Vahdat and David Clark and Jennifer Rexford A Purpose-built Global Network: Google's Move to SDN . . . . . . . . . . . . . . 100
R. V. Guha and Dan Brickley and Steve MacBeth Schema.org: Evolution of Structured Data on the Web . . . . . . . . . . . . . . . 10 Mihir Nanavati and Malte Schwarzkopf and Jake Wires and Andrew Warfield Non-volatile Storage . . . . . . . . . . 20 George Neville-Neil Time is an Illusion . . . . . . . . . . 30 Pat Helland Immutability Changes Everything . . . . 40 Nicholas Diakopoulos Accountability in Algorithmic Decision-making . . . . . . . . . . . . 50 Caitie McCaffrey The Verification of a Distributed System 60 Thomas A. Limoncelli How Sysadmins Devalue Themselves . . . . 70 Kate Matsudaira The Paradox of Autonomy and Recognition 80 George Neville-Neil Code Hoarding . . . . . . . . . . . . . 90
Brendan Burns and Brian Grant and David Oppenheimer and Eric Brewer and John Wilkes Borg, Omega, and Kubernetes . . . . . . 10 Heinrich Hartmann Statistics for Engineers . . . . . . . . 20 Poul-Henning Kamp More Encryption Means Less Privacy . . . 30 George Neville-Neil GNL is Not Linux . . . . . . . . . . . . 40 Ivar Jacobson and Ian Spence and Brian Kerr Use-Case 2.0 . . . . . . . . . . . . . . 50 Carlos Baquero and Nuno Preguiça Why Logical Clocks are Easy . . . . . . 60 Kate Matsudaira Delegation as Art . . . . . . . . . . . 70
Brendan Gregg The Flame Graph . . . . . . . . . . . . 10 George Neville-Neil What Are You Trying to Pull? . . . . . . 20 Sachin Date Should You Upload or Ship Big Data to the Cloud? . . . . . . . . . . . . . . . 30 Kate Matsudaira Nine Things I Didn't Know I Would Learn Being an Engineer Manager . . . . . . . 40 Ivan Beschastnikh and Patty Wang and Yuriy Brun and Michael D. and Ernst Debugging Distributed Systems . . . . . 50 Thomas A. Limoncelli The Small Batches Principle . . . . . . 60 Peter Bailis and Justine Sherry and Simon Peter Introducing Research for Practice . . . 70 Pat Helland Standing on Distributed Shoulders of Giants . . . . . . . . . . . . . . . . . 80
Tom Killalea The Hidden Dividends of Microservices 10 George Neville-Neil Chilling the Messenger . . . . . . . . . 20 Satnam Singh Cluster-level Logging of Containers with Containers . . . . . . . . . . . . . . . 30 Peter Bailis and Camille Fournier and Joy Arulraj and Andy Pavlo Research for Practice: Distributed Consensus and Implications of NVM on Database Management Systems . . . . . . 40 Andre Medeiros Dynamics of Change: Why Reactivity Matters . . . . . . . . . . . . . . . . 50 Kate Matsudaira Bad Software Architecture is a People Problem . . . . . . . . . . . . . . . . 60 Ulan Degenbaev and Jochen Eisinger and Manfred Ernst and Ross McIlroy and Hannes Payer Idle-Time Garbage-Collection Scheduling 70 Pat Helland The Singular Success of SQL . . . . . . 80
Thomas A. Limoncelli 10 Optimizations on Linear Search . . . 10 Adam Morrison Scaling Synchronization in Multicore Programs . . . . . . . . . . . . . . . . 20 George Neville-Neil Cloud Calipers . . . . . . . . . . . . . 30 Pete Hunt and Paul O'Shannessy and Dave Smith and Terry Coatta React: Facebook's Functional Turn on Writing JavaScript . . . . . . . . . . . 40 Kate Matsudaira Fresh Starts . . . . . . . . . . . . . . 50 Marius Eriksen Functional at Scale . . . . . . . . . . 60 Pat Helland The Power of Babble . . . . . . . . . . 70 Jean Yang and Vijay Janapa Reddi and Yuhao Zhu and Peter Bailis Research for Practice: Web Security and Mobile Web Computing . . . . . . . . . . 80
Ivar Jacobson and Ian Spence and Ed Seidewitz Industrial Scale Agile --- from Craft to Engineering . . . . . . . . . . . . . . 10 George Neville-Neil The Unholy Trinity of Software Development . . . . . . . . . . . . . . 20 Josh Bailey and Stephen Stuart Faucet: Deploying SDN in the Enterprise 30 Kate Matsudaira Resolving Conflict . . . . . . . . . . . 40 Neal Cardwell and Yuchung Cheng and C. Stephen Gunn and Soheil Hassas Yeganeh and Van Jacobson BBR: Congestion-Based Congestion Control 50 Irene Zhang and Fadel Adib and Peter Bailis Research for Practice: Distributed Transactions and Networks as Physical Sensors . . . . . . . . . . . . . . . . 60 Pat Helland Life Beyond Distributed Transactions . . 70
Thomas A. Limoncelli Are You Load Balancing Wrong? . . . . . 10 George Neville-Neil The Chess Player who Couldn't Pass the Salt . . . . . . . . . . . . . . . . . . 20 Theo Schlossnagle Time, but Faster . . . . . . . . . . . . 30 Mohamed Zahran Heterogeneous Computing: Here to Stay 40 Robert C. Seacord Uninitialized Reads . . . . . . . . . . 50 Arvind Narayanan and Andrew Miller and Song Han and Peter Bailis Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning . . . . . . . 60 Meng-Day (Mandel) Yu and Srinivas Devadas Pervasive, Dynamic Authentication of Physical Items . . . . . . . . . . . . . 70
Erik Meijer Making Money Using Math . . . . . . . . 10 Kate Matsudaira Does Anybody Listen to You? . . . . . . 20 Robert Guo MongoDB's JavaScript Fuzzer . . . . . . 30 George Neville-Neil Forced Exception-Handling . . . . . . . 40 Devon H. O'Dell The Debugging Mindset . . . . . . . . . 50 Peter Alvaro and Sumit Galwani and Peter Bailis Research for Practice: Tracing and Debugging Distributed Systems; Programming by Examples . . . . . . . . 60 Pat Helland and Simon Weaver and Ed Harris Too Big NOT to Fail . . . . . . . . . . 70
George Neville-Neil The Observer Effect . . . . . . . . . . 10 Mark A. Overton The IDAR Graph . . . . . . . . . . . . . 20 Kate Matsudaira Conversations with Technology Leaders: Erik Meijer . . . . . . . . . . . . . . 30 Benjamin Treynor Sloss and Mike Dahlin and Vivek Rau and Betsy Beyer The Calculus of Service Availability . . 40 Pat Helland Side Effects, Front and Center! . . . . 50 Graham Cormode Data Sketching . . . . . . . . . . . . . 60 Tawanna Dillahunt and Stefanie Mueller and Patrick Baudisch and Peter Bailis Research for Practice: Technology for Underserved Communities; Personal Fabrication . . . . . . . . . . . . . . 70
George Neville-Neil IoT: The Internet of Terror . . . . . . 10 Ivar Jacobson and Ian Spence and Pan-Wei Ng Is There a Single Method for the Internet of Things? . . . . . . . . . . 20 Kate Matsudaira 10 Ways to Be a Better Interviewer . . . 30 Alvaro Videla Metaphors We Compute By . . . . . . . . 40 Thomas A. Limoncelli Four Ways to Make CS&IT Curricula More Immersive . . . . . . . . . . . . . . . 50 Edward Steel and Yanik Berube and Jonas Bonér and Ken Britton and Terry Coatta Hootsuite: In Pursuit of Reactive Systems . . . . . . . . . . . . . . . . 60 John Regehr and Peter Bailis Vigorous Public Debates in Academic Computer Science . . . . . . . . . . . . 70
George Neville-Neil Cold, Hard Cache . . . . . . . . . . . . 10 Arvind Narayanan and Jeremy Clark Bitcoin's Academic Pedigree . . . . . . 20 Jacob Loveless Cache Me If You Can . . . . . . . . . . 30 Kate Matsudaira Breadth and Depth . . . . . . . . . . . 40 Pat Helland XML and JSON Are Like Cardboard . . . . 50 Antony Alappatt Network Applications Are Interactive . . 60 Albert Kwon and James Wilcox Private Online Communication; Highlights in Systems Verification . . . . . . . . 70
Peter Alvaro and Severine Tymon Abstracting the Geniuses Away from Failure Testing . . . . . . . . . . . . 10 Kate Matsudaira Views from the Top . . . . . . . . . . . 20 Andrew Leung and Andrew Spyker and Tim Bozarth Titus: Introducing Containers to the Netflix Cloud . . . . . . . . . . . . . 30 George Neville-Neil Reducing the Attack Surface . . . . . . 40 Yonatan Sompolinsky and Aviv Zohar Bitcoin's Underlying Incentives . . . . 50:29--50:52 Thomas A. Limoncelli Operational Excellence in April Fools' Pranks . . . . . . . . . . . . . . . . . 60 Malte Schwarzkopf Cluster Scheduling for Data Centers . . 70
Theo Schlossnagle Monitoring in a DevOps World . . . . . . 10 George Neville-Neil Popping Kernels . . . . . . . . . . . . 20 Nicole Forsgren and Mik Kersten DevOps Metrics . . . . . . . . . . . . . 30 Kate Matsudaira How Is Your Week Going So Far? . . . . . 40 Bridget Kromhout Containers Will Not Fix Your Broken Culture (and Other Hard Truths) . . . . 50 Deepak Vasisht Toward a Network of Connected Things . . 60 Jez Humble Continuous Delivery Sounds Great, but Will It Work Here? . . . . . . . . . . . 70
\vSt\vepán Davidovi\vc and Betsy Beyer Canary Analysis Service . . . . . . . . 10 Thomas A. Limoncelli Manual Work is a Bug . . . . . . . . . . 20 Diptanu Gon Choudhury and Timothy Perrett Designing Cluster Schedulers for Internet-Scale Services . . . . . . . . 30 Kate Matsudaira How to Come up with Great Ideas . . . . 40 Tobias Lauinger and Abdelberi Chaabane and Christo Wilson Thou Shalt Not Depend on Me . . . . . . 50 George Neville-Neil Watchdogs vs. Snowflakes . . . . . . . . 60 Dan Crankshaw and Joseph Gonzalez Prediction-Serving Systems . . . . . . . 70
David Chisnall C Is Not a Low-level Language . . . . . 10 George Neville-Neil Every Silver Lining Has a Cloud . . . . 20 Alex Petrov Algorithms Behind Modern Storage Systems 30 Pat Helland Consistently Eventual . . . . . . . . . 40 Noor Mubeen Workload Frequency Scaling Law --- Derivation and Verification . . . . . . 50 Gustavo Alonso FPGAs in Data Centers . . . . . . . . . 60
Pat Helland Mind Your State for Your State of Mind 10 Thomas A. Limoncelli GitOps: a Path to More Self-service IT 20 Zachary C. Lipton The Mythos of Model Interpretability . . 30 Kate Matsudaira The Secret Formula for Choosing the Right Next Role . . . . . . . . . . . . 40 Alex Ratner and Christopher Ré Knowledge Base Construction in the Machine-learning Era . . . . . . . . . . 50 Matt Fata and Philippe-Joseph Arida and Patrick Hahn and Betsy Beyer Corp to Cloud: Google's Virtual Desktops 60 George Neville-Neil The Obscene Coupling Known as Spaghetti Code . . . . . . . . . . . . . . . . . . 70
Silvia Esparrachiari and Tanya Reilly and Ashleigh Rentz Tracking and Controlling Microservice Dependencies . . . . . . . . . . . . . . 10 Kate Matsudaira How to Get Things Done When You Don't Feel Like It . . . . . . . . . . . . . . 20 Rich Bennett and Craig Callahan and Stacy Jones and Matt Levine and Merrill Miller and Andy Ozment How to Live in a Post-Meltdown and -Spectre World . . . . . . . . . . . . . 30 Shylaja Nukala and Vivek Rau Why SRE Documents Matter . . . . . . . . 40 George Neville-Neil A Chance Gardener . . . . . . . . . . . 50 Alpha Lam Using Remote Cache Service for Bazel . . 60
Richard L. Sites Benchmarking ``Hello, World!'' . . . . . 10 Jacek Czerwonka and Michaela Greiler and Christian Bird and Lucas Panjer and Terry Coatta CodeFlow: Improving the Code Review Process at Microsoft . . . . . . . . . . 20 Kate Matsudaira The Importance of a Great Finish . . . . 30 George Neville-Neil Writing a Test Plan . . . . . . . . . . 40 Simson Garfinkel and John M. Abowd and Christian Martindale Understanding Database Reconstruction Attacks on Public Data . . . . . . . . . 50 Thomas A. Limoncelli SQL is No Excuse to Avoid DevOps . . . . 60 Jessie Frazelle Security for the Modern Age . . . . . . 70 Ivar Jacobson and Roly Stimson Tear Down the Method Prisons! Set Free the Practices! . . . . . . . . . . . . . 80
Jim Waldo A Hitchhiker's Guide to the Blockchain Universe . . . . . . . . . . . . . . . . 10 Kate Matsudaira Design Patterns for Managing Up . . . . 20 Benjamin Treynor Sloss and Shylaja Nukala and Vivek Rau Metrics That Matter . . . . . . . . . . 30 George Neville-Neil Know Your Algorithms . . . . . . . . . . 40 Raymond Blum and Betsy Beyer Achieving Digital Permanence . . . . . . 50 Nitesh Mor Edge Computing . . . . . . . . . . . . . 60 Pat Helland Identity by Any Other Name . . . . . . . 70
Adrian Colyer SageDB and NetAccel . . . . . . . . . . 10 Aleksander Kuzmanovic Net Neutrality: Unexpected Solution to Blockchain Scaling . . . . . . . . . . . 20 George Neville-Neil The Worst Idea of All Time . . . . . . . 30 Martin Kleppmann and Alastair R. Beresford and Boerge Svingen Online Event Processing . . . . . . . . 40 Kate Matsudaira How to Create a Great Team Culture (and Why It Matters) . . . . . . . . . . . . 50 Ulan Degenbaev and Michael Lippautz and Hannes Payer Garbage Collection as a Joint Venture 60 Thomas A. Limoncelli Tom's Top Ten Things Executives Should Know About Software . . . . . . . . . . 70 Zachary C. Lipton and Jacob Steinhardt Troubling Trends in Machine Learning Scholarship . . . . . . . . . . . . . . 80
Adrian Colyer GAN Dissection and Datacenter RPCs . . . 10 Natasha Noy and Yuqing Gao and Anshu Jain and Anant Narayanan and Alan Patterson and Jamie Taylor Industry-scale Knowledge Graphs: Lessons and Challenges . . . . . . . . . . . . . 20 Kate Matsudaira Overly Attached . . . . . . . . . . . . 30 Anna Wiedemann and Nicole Forsgren and Manuel Wiesche and Heiko Gewald and Helmut Krcmar The DevOps Phenomenon . . . . . . . . . 40 David Evans and Richard McDonald and Terry Coatta Access Controls and Health Care Records: Who Owns the Data? . . . . . . . . . . . 50 Pat Helland Extract, Shoehorn, and Load . . . . . . 60 George Neville-Neil MUST and MUST NOT . . . . . . . . . . . 70 Russ Cox Surviving Software Dependencies . . . . 80
Adrian Colyer Time Protection in Operating Systems and Speaker Legitimacy Detection . . . . . . 10 Jessie Frazelle Open-source Firmware . . . . . . . . . . 20 Kate Matsudaira The Evolution of Management . . . . . . 30 Tom Killalea Velocity in Software Engineering . . . . 40 Thomas A. Limoncelli Demo Data as Code . . . . . . . . . . . 50 George Neville-Neil What is a CSO Good For? . . . . . . . . 60 Shaul Kfir and Camille Fournier DAML: The Contract Language of Distributed Ledgers . . . . . . . . . . 70
Terence Kelly Persistent Memory Programming on Conventional Hardware . . . . . . . . . 10 George Neville-Neil Koding Academies . . . . . . . . . . . . 20 Michelle Vaccaro and Jim Waldo The Effects of Mixing Machine Learning and Human Judgment . . . . . . . . . . . 30 Pat Helland Write Amplification Versus Read Perspiration . . . . . . . . . . . . . . 40 Ariana Mirian Hack for Hire . . . . . . . . . . . . . 50 Adrian Colyer Putting Machine Learning into Production Systems . . . . . . . . . . . . . . . . 60
Adrian Colyer Back under a SQL Umbrella . . . . . . . 10 Matt Godbolt Optimizations in C++ Compilers . . . . . 20 Pat Helland Space Time Discontinuum . . . . . . . . 30 Sanjay Sha The Reliability of Enterprise Applications . . . . . . . . . . . . . . 40 Thomas A. Limoncelli API Practices If You Hate Your Customers 50 Jessie Frazelle Opening up the Baseboard Management Controller . . . . . . . . . . . . . . . ?? George V. Neville-Neil Numbers Are for Computers, Strings Are for Humans . . . . . . . . . . . . . . . ??
David D. Woods and John Allspaw Revealing the Critical Role of Human Performance in Software . . . . . . . . ?? Richard I. Cook Above the Line, Below the Line . . . . . ?? Marisa R. Grayson Cognitive Work of Hypothesis Exploration During Anomaly Response . . . . . . . . ?? Laura M. D. Maguire Managing the Hidden Costs of Coordination . . . . . . . . . . . . . . ?? J. Paul Reed Beyond the Fix-it Treadmill . . . . . . ?? Jessie Frazelle Securing the Boot Process . . . . . . . ?? George V. Neville-Neil Master of Tickets . . . . . . . . . . . ??
Anonymous Demystifying Stablecoins . . . . . . . . ?? Jessie Frazelle Chipping Away at Moore's Law . . . . . . ?? Thomas A. Limoncelli Communicate Using the Numbers 1, 2, 3, and More . . . . . . . . . . . . . . . . ??
Charisma Chan and Beth Cooper Debugging Incidents in Google's Distributed Systems . . . . . . . . . . ?? Jessie Frazelle Power to the People . . . . . . . . . . ?? Terence Kelly Is Persistent Memory Persistent? . . . . ?? Arvind Narayanan and Arunesh Mathur and Marshini Chetty and Mihir Kshirsagar Dark Patterns: Past, Present, and Future ?? George Neville-Neil Broken Hearts and Coffee Mugs . . . . . ??
Jessie Frazelle The Life of a Data Byte: Be kind and rewind . . . . . . . . . . . . . . . . . 5--28 Thomas A. Limoncelli Five Nonobvious Remote Work Techniques: Emulating the efficiency of in-person conversations . . . . . . . . . . . . . 29--38 George Neville-Neil Sanity vs. Invisible Markings: Tabs vs. spaces . . . . . . . . . . . . . . . . . 39--42 Pat Helland Data on the Outside vs. Data on the Inside: Data kept outside SQL has different characteristics from data kept inside . . . . . . . . . . . . . . . . . 43--60 Oskar Mencer and Dennis Allison and Elad Blatt and Mark Cummings and Michael J. Flynn and Jerry Harris and Carl Hewitt and Quinn Jacobson and Maysam Lavasani and Mohsen Moazami and Hal Murray and Masoud Nikravesh and Andreas Nowatzyk and Mark Shand and Shahram Shirazi The History, Status, and Future of FPGAs: Hitting a nerve with field-programmable gate arrays . . . . . 71--82 Jeff Sutherland and Ivar Jacobson and Brian Kerr Scrum Essentials Cards: Experiences of Scrum Teams Improving with Essence . . . 83--106
Jessie Frazelle Out-of-this-World Additive Manufacturing: From thingamabobs to rockets, $3$D printing takes many forms 5--20 George V. Neville-Neil Removing Kode: Dead functions and dead features . . . . . . . . . . . . . . . . 21--25 Terence Kelly Efficient Graph Search . . . . . . . . . 25--36 Roger Piqueras Jover Security Analysis of SMS as a Second Factor of Authentication: The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping . . . . . . . . . . . . . . . . 37--60 Phil Vachon The Identity in Everyone's Pocket: Keeping users secure through their smartphones . . . . . . . . . . . . . . 61--94 Edlyn V. Levine The Die is Cast: Hardware Security is Not Assured . . . . . . . . . . . . . . 95--109
Jessie Frazelle Battery Day: a closer look at the technology that makes portable electronics possible . . . . . . . . . . 5--25 Thomas A. Limoncelli The Time I Stole \$10,000 from {Bell Labs}: Or why {DevOps} encourages us to celebrate outages . . . . . . . . . . . 26--35 George V. Neville-Neil Kabin Fever: KV's guidelines for KFH (koding from home) . . . . . . . . . . . 35--40 Terence Kelly Decentralized Computing . . . . . . . . 41--53 David Crawshaw Everything VPN is New Again: The 24-year-old security model has found a second wind . . . . . . . . . . . . . . 54--66 Tom Killalea A Second Conversation with Werner Vogels: The Amazon CTO sits with Tom Killalea to discuss designing for evolution at scale . . . . . . . . . . . 67--92 Miguel Guevara and Damien Desfontaines and Jim Waldo and Terry Coatta Differential Privacy: The Pursuit of Protections by Default: a discussion with Miguel Guevara, Damien Desfontaines, Jim Waldo, and Terry Coatta . . . . . . . . . . . . . . . . . 93--112
Jessie Frazelle Let's Play Global Thermonuclear Energy: It's important to know where your power comes from . . . . . . . . . . . . . . . 5--20 Pat Helland Baleen Analytics: Large-scale filtering of data provides serendipitous surprises 21--30 George V. Neville-Neil The Non-psychopath's Guide to Managing an Open-source Project: Respect your staff, learn from others, and know when to let go . . . . . . . . . . . . . . . 30--36 Terence Kelly Offline Algorithms in Low-Frequency Trading: Clearing Combinatorial Auctions 37--51 Chris Nokleberg and Brad Hawkes Best Practice: Application Frameworks: While powerful, frameworks are not for everyone . . . . . . . . . . . . . . . . 52--77 Jatinder Singh and Jennifer Cobbe and Do Le Quoc and Zahra Tarkhani Enclaves in the Clouds: Legal considerations and broader implications 78--114 Anonymous Always-on Time-series Database: Keeping Up Where There's No Way to Catch Up: a discussion with Theo Schlossnagle, Justin Sheehy, and Chris McCubbin . . . 115--135
Pat Helland Fail-fast Is Failing\ldots Fast!: Changes in compute environments are placing pressure on tried-and-true distributed-systems solutions. . . . . . 5--15 George V. Neville-Neil Aversion to Versions: Resolving code-dependency issues . . . . . . . . . 16--19 Nicole Forsgren and Margaret-Anne Storey and Chandra Maddila and Thomas Zimmermann and Brian Houck and Jenna Butler The SPACE of Developer Productivity: There's more to it than you think. . . . 20--48 Mark Russinovich and Manuel Costa and Cédric Fournet and David Chisnall and Antoine Delignat-Lavaud and Sylvan Clebsch and Kapil Vaswani and Vikas Bhatia Toward Confidential Cloud Computing: Extending hardware-enforced cryptographic protection to data while in use . . . . . . . . . . . . . . . . . 49--76 Niklas Blum and Serge Lachapelle and Harald Alvestrand WebRTC --- Realtime Communication for the Open Web Platform: What was once a way to bring audio and video to the web has expanded into more use cases we could ever imagine. . . . . . . . . . . 77--93 João Varajão Software Development in Disruptive Times: Creating a software solution with fast decision capability, agile project management, and extreme low-code technology . . . . . . . . . . . . . . . 94--103
Jessie Frazelle A New Era for Mechanical CAD: Time to move forward from decades-old design . . 5--16 Pat Helland ACID: My Personal ``C`` Change: How could I miss such a simple thing? . . . 17--20 George V. Neville-Neil In Praise of the Disassembler: There's much to be learned from the lower-level details of hardware . . . . . . . . . . 21--28 Terence Kelly and Weiwei Gu and Vladimir Maksimovski Schrödinger's Code: Undefined behavior in theory and practice . . . . . . . . . . 28--44 Ramya Srinivasan and Ajay Chander Biases in AI Systems: a survey for practitioners . . . . . . . . . . . . . 45--64 Atefeh Mashatan and Douglas Heintzman The Complex Path to Quantum Resistance: Is your organization prepared? . . . . . 65--92 Michael Gardiner and Alexander Truskovsky and George Neville-Neil and Atefeh Mashatan Quantum-safe Trust for Vehicles: The race is already on . . . . . . . . . . . 93--115
Liu Leqi and Dylan Hadfield-Menell and Zachary C. Lipton When Curation Becomes Creation: Algorithms, microcontent, and the vanishing distinction between platforms and creators . . . . . . . . . . . . . . 11--15 Pat Helland Don't Get Stuck in the ``Con'' Game: Consistency, convergence, and confluence are not the same! Eventual consistency and eventual convergence aren't the same as confluence, either . . . . . . . . . 16--35 George V. Neville-Neil Divide and Conquer: The use and limits of bisection . . . . . . . . . . . . . . 37--39 Poul-Henning Kamp What Went Wrong?: Why we need an IT accident investigation board . . . . . . 40--44 Piero Molino and Christopher Ré Declarative Machine Learning Systems: The future of machine learning will depend on it being in the hands of the rest of us . . . . . . . . . . . . . . . 46--76 Ashish Gehani and Raza Ahmad and Hassan Irshad and Jianqiao Zhu and Jignesh Patel Digging into Big Provenance (with SPADE): a user interface for querying provenance . . . . . . . . . . . . . . . 77--106 Torsten Ullrich Real-world String Comparison: How to handle Unicode sequences correctly . . . 107--116
Terence Kelly Crashproofing the Original NoSQL Key--Value Store: an upgrade for the \tt gdbm database . . . . . . . . . . . . . 5--18 Anonymous Patent Absurdity: a case when ignorance is the best policy . . . . . . . . . . . 19--22 Poul-Henning Kamp The Software Industry IS STILL the Problem: The time is (also) way overdue for IT professional liability . . . . . 23--28 Patrick Thomson Static Analysis: an Introduction: The fundamental challenge of software engineering is one of complexity . . . . 29--41 Timothy Clem and Patrick Thomson Static Analysis at GitHub: an experience report . . . . . . . . . . . . . . . . . 42--67 Ayman Nadeem Human-Centered Approach to Static-Analysis-Driven Developer Tools: The future depends on good HCI . . . . . 68--95 Daniil Tiganov and Lisa Nguyen Quang Do and Karim Ali Designing UIs for Static Analysis Tools: Evaluating tool design guidelines with SWAN . . . . . . . . . . . . . . . . . . 97--118
Jessie Frazelle Chip Measuring Contest: The benefits of purpose-built chips . . . . . . . . . . 5--21 George V. Neville-Neil I Unplugged What?: The lessons here are broader than just a simple ``Don't do that.'' . . . . . . . . . . . . . . . . 22--25 Kelly Shortridge and Ryan Petrich Lamboozling Attackers: a New Generation of Deception: Software engineering teams can exploit attackers' human nature by building deception environments. . . . . 26--59 Alvaro Videla Meaning and Context in Computer Programs: Sharing domain knowledge among programmers using the source code as the medium . . . . . . . . . . . . . . . . . 60--68 Margo Seltzer and Mike Olson and Kirk McCusick A Conversation with Margo Seltzer and Mike Olson: The history of Berkeley DB 69--86 Kallista Bonawitz and Peter Kairouz and Brendan McMahan and Daniel Ramage Federated Learning and Privacy: Building privacy-preserving systems for machine learning and data science on decentralized data . . . . . . . . . . . 87--114 Reynold Xin and Wes McKinney and Alan Gates and Chris McCubbin It Takes a Community: The Open-source Challenge . . . . . . . . . . . . . . . 115--136
Terence Kelly Steampunk Machine Learning: Victorian contrivances for modern data science . . 5--17 George V. Neville-Neil Getting Off the Mad Path: Debuggers and assertions . . . . . . . . . . . . . . . 18--21 Poul-Henning Kamp Surveillance Too Cheap to Meter: Stopping Big Brother would require an expensive overhaul of the entire system. 22--27 Valerie Chen and Jeffrey Li and Joon Sik Kim and Gregory Plumb and Ameet Talwalkar Interpretable Machine Learning: Moving from mythos to diagnostics . . . . . . . 28--56 Phil Vachon The Keys to the Kingdom: a deleted private key, a looming deadline, and a last chance to patch a new static root of trust into the bootloader . . . . . . 57--65 Michael Mattioli FPGAs in Client Compute Hardware: Despite certain challenges, FPGAs provide security and performance benefits over ASICs . . . . . . . . . . 66--88
George V. Neville-Neil The Planning and Care of Data: Rearranging buckets for no good reason 4--9 Alexandros Gazis and Eleftheria Katsiri Middleware 101: What to know now and for the future . . . . . . . . . . . . . . . 10--23 Archie L. Cobbs Persistence Programming: Are we doing this right? . . . . . . . . . . . . . . 24--39 Brian Eaton and Jeff Stewart and Jon Tedesco and N. Cihan Tas Distributed Latency Profiling through Critical Path Tracing: CPT can provide actionable and precise latency analysis. 40--79 Pat Helland Autonomous Computing: We frequently compute across autonomous boundaries but the implications of the patterns to ensure independence are rarely discussed. . . . . . . . . . . . . . . . 80--104
Poul-Henning Kamp Linear Address Spaces: Unsafe at any speed . . . . . . . . . . . . . . . . . 5--10 George V. Neville-Neil When Should a Black Box Be Transparent?: When is a replacement not a replacement? 11--15 Terence Kelly Persistent Memory Allocation: Leverage to move a world of software . . . . . . 16--30 Benoit Baudry and Tim Toady and Martin Monperrus Long Live Software Easter Eggs!: They are as old as software . . . . . . . . . 31--42 Jenna Butler and Catherine Yeh Walk a Mile in Their Shoes: The Covid pandemic through the lens of four tech workers . . . . . . . . . . . . . . . . 43--66 James Agnew and Pat Helland and Adam Cole FHIR: Reducing Friction in the Exchange of Healthcare Data: a discussion with James Agnew, Pat Helland, and Adam Cole 67--88
Pat Helland I'm Probably Less Deterministic Than I Used to Be: Embracing randomness is necessary in cloud environments. . . . . 5--13 George V. Neville-Neil Securing the Company Jewels: GitHub and runbook security . . . . . . . . . . . . 14--17 James P. Hughes and Whitfield Diffie The Challenges of IoT, TLS, and Random Number Generators in the Real World: Bad random numbers are still with us and are proliferating in modern systems . . . . 18--40 Sutapa Mondal and Mangesh S. Gharote and Sachin P. Lodha Privacy of Personal Information: Going incog in a goldfish bowl . . . . . . . . 41--87 Martin Kleppmann and Peter Alvaro Convergence: Research for Practice reboot . . . . . . . . . . . . . . . . . 88--95
Poul-Henning Kamp CSRB's Opus One: Comments on the Cyber Safety Review Board Log4j Event Report 5--10 George V. Neville-Neil The Four Horsemen of an Ailing Software Project: Don't let the pale rider catch you with an exception . . . . . . . . . 11--15 Raphael Auer and Rainer BÃ\P hme and Jeremy Clark and Didem Demirag Mapping the Privacy Landscape for Central Bank Digital Currencies: Now is the time to shape what future payment flows will reveal about you . . . . . . 16--38 Mache Creeger The Rise of Fully Homomorphic Encryption: Often called the Holy Grail of cryptography, commercial FHE is near 39--60 Michael Loftus and Andrew Vezina and Rick Doten and Atefeh Mashatan The Arrival of Zero Trust: What Does it Mean? . . . . . . . . . . . . . . . . . 61--79 Matthew Bush and Atefeh Mashatan From Zero to One Hundred: Demystifying zero trust and its implications on enterprise people, process, and technology . . . . . . . . . . . . . . . 80--106 Ram Alagappan and Peter Alvaro Crash Consistency: Keeping data safe in the presence of crashes is a fundamental problem . . . . . . . . . . . . . . . . 107--115
Thomas A. Limoncelli Split Your Overwhelmed Teams: Two Teams of Five is Not the Same as One Team of Ten . . . . . . . . . . . . . . . . . . 5--13 George V. Neville-Neil The Elephant in the Room: It's time to get the POSIX elephant off our necks . . 14--19 Terence Kelly Literate Executables . . . . . . . . . . 20--32 Peter Ward and Paul Wankadia and Kavita Guliani Reinventing Backend Subsetting at Google: Designing an algorithm with reduced connection churn that could replace deterministic subsetting . . . . 33--57 Jorge A. Navas and Ashish Gehani OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-program Specialization: Leveraging scalable pointer analysis, value analysis, and dynamic analysis . . . . . 58--85 Maya Kaczorowski and Falcon Momot and George V. Neville-Neil and Chris McCubbin OSS Supply-chain Security: What Will It Take? . . . . . . . . . . . . . . . . . 86--102
George V. Neville-Neil All Sliders to the Right: Hardware Overkill . . . . . . . . . . . . . . . . 4--8 Gabriel Falcao and JoÃ\pounds o Dinis Ferreira To PiM or Not to PiM: The case for in-memory inferencing of quantized CNNs at the edge . . . . . . . . . . . . . . 9--34 Christian Bird and Denae Ford and Thomas Zimmermann and Nicole Forsgren and Eirini Kalliamvakou and Travis Lowdermilk and Idan Gazit Taking Flight with Copilot: Early insights and opportunities of AI-powered pair-programming tools . . . . . . . . . 35--57 Guenever Aldrich and Danny Tsang and Jason McKenney Three-part Harmony for Program Managers Who Just Don't Get It, Yet: Open-source software, open standards, and agile software development . . . . . . . . . . 58--79 Stefan Nagy and Peter Alvaro The Fun in Fuzzing: The debugging technique comes into its own . . . . . . 80--87
George V. Neville-Neil The Parchment Path?: Is there ever a time when learning is not of value --- for its own sake? . . . . . . . . . . . 5--11 Terence Kelly and Yekai Pan Catch-23: The New C Standard Sets the World on Fire . . . . . . . . . . . . . 12--30 Simson Garfinkel and Jon Stewart Sharpening Your Tools: Updating bulk\_extractor for the 2020s . . . . . 30--56 Kelly Shortridge and Josiah Dykstra Opportunity Cost and Missed Chances in Optimizing Cybersecurity: The loss of potential gain from other alternatives when one alternative is chosen . . . . . 30--56 Zachary Tellman Designing a Framework for Conversational Interfaces: Combining the latest advances in machine learning with earlier approaches . . . . . . . . . . . 85--101 Alfred Spector and Peter Norvig and Chris Wiggins and Jeannette Wing and Ben Fried and Michael Tingley More Than Just Algorithms: a discussion with Alfred Spector, Peter Norvig, Chris Wiggins, Jeannette Wing, Ben Fried, and Michael Tingley . . . . . . . . . . . . 102--129
George V. Neville-Neil The Human Touch: There is no substitute for good, direct, honest training . . . 9--13 Thomas A. Limoncelli Improvement on End-to-End Encryption May Lead to Silent Revolution: Researchers are on a brink of what could be the next big improvement in communication privacy 10--13 Amanda Casari and Julia Ferraioli and Juniper Lovato Beyond the Repository: Best practices for open source ecosystems researchers 14--34 Abi Noda and Margaret-Anne Storey and Nicole Forsgren and Michaela Greiler DevEx: What Actually Drives Productivity: The developer-centric approach to measuring and improving productivity . . . . . . . . . . . . . . 35--53 David Collier-Brown You Don't know Jack about Application Performance: Knowing whether you're doomed to fail is important when starting a project . . . . . . . . . . . 54--65 Edlyn V. Levine Cargo Cult AI: Is the ability to think scientifically the defining essence of intelligence? . . . . . . . . . . . . . 66--87 Kostis Kaffes and Peter Alvaro OS Scheduling: Better scheduling policies for modern computing systems 88--95
Kate Matsudaira Managing Hybrid Teams: The combination of on-site and remote workers takes extra effort from team leaders. . . . . 5--16 Poul-Henning Kamp Don't ``Think of the Internet!'': No human right is absolute. . . . . . . . . 17--22 Phil Vachon Security Mismatch: Security must be a business enabler, not a hinderer. . . . 23--28 George V. Neville-Neil Stone Knives and Bear Skins . . . . . . 29--35 Alvaro Videla Echoes of Intelligence: Textual interpretation and large language models 36--53 Samuel W. Stark and A. Theodore Markettos and Simon W. Moore How Flexible is CXL's Memory Protection?: Replacing a sledgehammer with a scalpel . . . . . . . . . . . . . 54--64 Ethan Miller and Achilles Benetopoulos and George Neville-Neil and Pankaj Mehra and Daniel Bittman Pointers in Far Memory: a rethink of how data and computations should be organized . . . . . . . . . . . . . . . 75--93
Thomas A. Limoncelli Knowing What You Neeed to Know: Personal, team, and organizational effectiveness can be improved with a little preparation . . . . . . . . . . . 5--17 George V. Neville-Neil Halfway Around the World: Learn the language, meet the people, eat the food 18--22 Terence Kelly Protecting Secrets from Computers . . . 23--43 Mark Russinovich Confidential Computing: Elevating Cloud Security and Privacy: Working toward a more secure and innovative future . . . 44--48 David Kaplan Hardware VM Isolation in the Cloud: Enabling confidential computing with AMD SEV-SNP technology . . . . . . . . . . . 49--67 Gobikrishna Dhanuskodi and Sudeshna Guha and Vidhya Krishnan and Aruna Manjunatha and Michael O'Connor and Rob Nertney and Phil Rogers Creating the First Confidential GPUs: The team at NVIDIA brings confidentiality and integrity to user code and data for accelerated computing 68--93 Antoine Delignat-Lavaud and CÃ\copyright dric Fournet and Kapil Vaswani and Sylvan Clebsch and Maik Riechert and Manuel Costa and Mark Russinovich Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy . . . . . . . . . . . . . . 94--122
Kate Matsudaira Software Managers' Guide to Operational Excellence: The secret to being a great engineering leader? Setting up the right checks and balances . . . . . . . . . . 5--12 Phil Vachon The Security Jawbreaker: Access to a system should not imply authority to use it. Enter the principle of complete mediation . . . . . . . . . . . . . . . 13--21 George V. Neville-Neil Dear Diary: On keeping a laboratory notebook . . . . . . . . . . . . . . . . 22--28 Geoffrey H. Cooper Device Onboarding using FDO and the Untrusted Installer Model: FDO's untrusted model is contrasted with Wi-Fi Easy Connect to illustrate the advantages of each mechanism . . . . . . 29--53 Harsh Deokuliar and Raghvinder S. Sangwan and Youakim Badr and Satish M. Srinivasan Improving Testing of Deep-learning Systems: a combination of differential and mutation testing results in better test data . . . . . . . . . . . . . . . 54--65 Ivar Jacobson and Alistair Cockburn Use Cases are Essential: Use cases provide a proven method to capture and explain the requirements of a system in a concise and easily understood format 66--86 João Varajão and António Trigo and Miguel Almeida Low-code Development Productivity: ``Is winter coming'' for code-based technologies? . . . . . . . . . . . . . 87--107
Thomas A. Limoncelli What do Trains, Horses, and Home Internet Installation have in Common?: Avoid changes mid-process . . . . . . . 5--11 George V. Neville-Neil Is There Another System?: Computer science is the study of what can be automated . . . . . . . . . . . . . . . 12--15 Terence Kelly Programmer Job Interviews: The Hidden Agenda . . . . . . . . . . . . . . . . . 16--26 David Chisnall How to Design an ISA: The popularity of RISC-V has led many to try designing instruction sets . . . . . . . . . . . . 27--46 Nicole Forsgren and Eirini Kalliamvakou and Abi Noda and Michaela Greiler and Brian Houck and Margaret-Anne Storey DevEx in Action: a study of its tangible impacts . . . . . . . . . . . . . . . . 47--77 Nigel Smart and Joshua W. Baron and Sanjay Saravanan and Jordan Brandt and Atefeh Mashatan Multiparty Computation: To Secure Privacy, Do the Math: a discussion with Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, and Atefeh Mashatan . . . . . . . . . . . . . . . . 78--100 Divyansh Kaushik and Zachary C. Lipton and Alex John London Resolving the Human-subjects Status of Machine Learning's Crowdworkers: What ethical framework should govern the interaction of ML researchers and crowdworkers? . . . . . . . . . . . . . 101--127 Peter Alvaro and Manuel Rigger Automatically Testing Database Systems: DBMS testing with test oracles, transaction history, and fuzzing . . . . 128--135
Kate Matsudaira Give Your Project a Name: It goes a long way toward creating a cohesive team with strong morale . . . . . . . . . . . . . 5--9 Poul-Henning Kamp Free and Open Source Software --- and Other Market Failures: Open source is not a goal as much as a means to an end 10--16 George V. Neville-Neil Software Drift: Open source forking . . 17--22 Queenie Luo and Michael J. Puett and Michael D. Smith A ``Perspectival'' Mirror of the Elephant: Investigating language bias on Google, ChatGPT, YouTube, and Wikipedia 23--47 Padmal Vitharana and Shahir A. Daya Challenges in Adopting and Sustaining Microservice-based Software Development: Organizational challenges can be more difficult than technical ones . . . . . 48--72 Christoph Kern Developer Ecosystems for Software Safety: Continuous assurance at scale 73--99 Yifei Wang From Open Access to Guarded Trust: Experimenting responsibly in the age of data privacy . . . . . . . . . . . . . . 100--113
Charles Garcia-Tobin and Mark Knight Elevating Security with Arm CCA: Attestation and verification are integral to adopting confidential computing . . . . . . . . . . . . . . . 39--56 Jinnan Guo and Peter Pietzuch and Andrew Paverd and Kapil Vaswani Trustworthy AI using Confidential Federated Learning: Federated learning and confidential computing are not competing technologies . . . . . . . . . 87--107 Matthew A. Johnson and Stavros Volos and Ken Gordon and Sean T. Allen and Christoph M. Wintersteiger and Sylvan Clebsch and John Starks and Manuel Costa Confidential Container Groups: Implementing confidential computing on Azure container instances . . . . . . . 57--86 Terence Kelly Zero Tolerance for Bias . . . . . . . . 19--38 Thomas A. Limoncelli Make Two Trips: Larry David's New Year's resolution works for IT too . . . . . . 5--14 George V. Neville-Neil Structuring Success: The problem with software structure is people don't really learn it until they really need it . . . . . . . . . . . . . . . . . . . 15--18 Raluca Ada Popa Confidential Computing or Cryptographic Computing?: Tradeoffs between cryptography and hardware enclaves . . . 108--132
Kate Matsudaira Working Models for Tackling Tech Debt: Understand the options to tailor an approach that suits your needs . . . . . 5--13 Poul-Henning Kamp The Expense of Unprotected Free Software: It's high time FOSS maintainers got a bit of appreciation 14--18 George V. Neville-Neil Repeat, Reproduce, Replicate: The pressure to publish versus the will to defend scientific claims . . . . . . . . 15--20 Erik Meijer Virtual Machinations: Using Large Language Models as Neural Computers: LLMs can function not only as databases, but also as dynamic, end-user programmable neural computers . . . . . 25--52 Mansi Khemka and Brian Houck Toward Effective AI Support for Developers: a survey of desires and concerns . . . . . . . . . . . . . . . . 53--78 Qian Li and Peter Kraft Transactions and Serverless are Made for Each Other: If serverless platforms could wrap functions in database transactions, they would be a good fit for database-backed applications . . . . 79--91 David Collier-Brown You Don't Know Jack about Bandwidth: If you're an ISP and all your customers hate you, take heart. This is now a solvable problem . . . . . . . . . . . . 92--102
Peter Alvaro and Andrew Quinn Deterministic Record-and-Replay: Zeroing in only on the nondeterministic actions of the process . . . . . . . . . . . . . Catherine Hayes and David Malone Questioning the Criteria for Evaluating Non-cryptographic Hash Functions: Maybe we need to think more about non-cryptographic hash functions. . . . Shuvendu Lahiri and Alexey Svyatkovskiy and Christian Bird and Erik Meijer and Terry Coatta Program Merge: What's Deep Learning Got to Do with It?: a discussion with Shuvendu Lahiri, Alexey Svyatkovskiy, Christian Bird, Erik Meijer and Terry Coatta . . . . . . . . . . . . . . . . . George V. Neville-Neil Unwanted Surprises: When that joke of an API is on you . . . . . . . . . . . . . João Varajão and António Trigo Assessing IT Project Success: Perception vs. Reality: We would not be in the digital age if it were not for the recurrent success of IT projects. . . . Mark Russinovich and Cédric Fournet and Greg Zaverucha and Josh Benaloh and Brandon Murdoch and Manuel Costa Confidential Computing Proofs: an alternative to cryptographic zero-knowledge . . . . . . . . . . . . . Phil Vachon Test Accounts: a Hidden Risk: You may decide the risks are acceptable. But, if not, here are some rules for avoiding them. . . . . . . . . . . . . . . . . . Jim Waldo and Soline Boussard GPTs and Hallucination: Why do large language models hallucinate? . . . . . .
Anonymous Latest Developer Headlines: Watch Out for Bluetooth Sniffers; The Samba Team announces Samba 3.0.0 RC1; Aussie Government to See Microsoft Source Code; U.S. Tech Workers Training Replacements; `Apache Geronimo' Looks to J2EE Implementation . . . . . . . . . . . . . ??