Journal: ACM Queue

Volume 18, Issue 6

5 -- 20Jessie Frazelle. Let's Play Global Thermonuclear Energy: It's important to know where your power comes from
21 -- 30Pat Helland. Baleen Analytics: Large-scale filtering of data provides serendipitous surprises
30 -- 36George V. Neville-Neil. The Non-psychopath's Guide to Managing an Open-source Project: Respect your staff, learn from others, and know when to let go
37 -- 51Terence Kelly. Offline Algorithms in Low-Frequency Trading: Clearing Combinatorial Auctions
52 -- 77Chris Nokleberg, Brad Hawkes. Best Practice: Application Frameworks: While powerful, frameworks are not for everyone
78 -- 114Jatinder Singh, Jennifer Cobbe, Do Le Quoc, Zahra Tarkhani. Enclaves in the Clouds: Legal considerations and broader implications
115 -- 135. Always-on Time-series Database: Keeping Up Where There's No Way to Catch Up: A discussion with Theo Schlossnagle, Justin Sheehy, and Chris McCubbin

Volume 18, Issue 5

5 -- 25Jessie Frazelle. Battery Day: A closer look at the technology that makes portable electronics possible
26 -- 35Thomas A. Limoncelli. The Time I Stole $10, 000 from Bell Labs: Or why DevOps encourages us to celebrate outages
35 -- 40George V. Neville-Neil. Kabin Fever: KV's guidelines for KFH (koding from home)
41 -- 53Terence Kelly. Decentralized Computing
54 -- 66David Crawshaw. Everything VPN is New Again: The 24-year-old security model has found a second wind
67 -- 92Tom Killalea. A Second Conversation with Werner Vogels: The Amazon CTO sits with Tom Killalea to discuss designing for evolution at scale
93 -- 112Miguel Guevara, Damien Desfontaines, Jim Waldo, Terry Coatta. Differential Privacy: The Pursuit of Protections by Default: A discussion with Miguel Guevara, Damien Desfontaines, Jim Waldo, and Terry Coatta

Volume 18, Issue 4

5 -- 20Jessie Frazelle. Out-of-this-World Additive Manufacturing: From thingamabobs to rockets, 3D printing takes many forms
21 -- 25George V. Neville-Neil. Removing Kode: Dead functions and dead features
25 -- 36Terence Kelly. Efficient Graph Search
37 -- 60Roger Piqueras Jover. Security Analysis of SMS as a Second Factor of Authentication: The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping
61 -- 94Phil Vachon. The Identity in Everyone's Pocket: Keeping users secure through their smartphones
95 -- 109Edlyn V. Levine. The Die is Cast: Hardware Security is Not Assured

Volume 18, Issue 3

5 -- 28Jessie Frazelle. The Life of a Data Byte: Be kind and rewind
29 -- 38Thomas A. Limoncelli. Five Nonobvious Remote Work Techniques: Emulating the efficiency of in-person conversations
39 -- 42George V. Neville-Neil. Sanity vs. Invisible Markings: Tabs vs. spaces
43 -- 60Pat Helland. Data on the Outside vs. Data on the Inside: Data kept outside SQL has different characteristics from data kept inside
71 -- 82Oskar Mencer, Dennis Allison, Elad Blatt, Mark Cummings, Michael J. Flynn, Jerry Harris, Carl Hewitt, Quinn Jacobson, Maysam Lavasani, Mohsen Moazami, Hal Murray, Masoud Nikravesh, Andreas Nowatzyk, Mark Shand, Shahram Shirazi. The History, Status, and Future of FPGAs: Hitting a nerve with field-programmable gate arrays
83 -- 106Jeff Sutherland, Ivar Jacobson, Brian Kerr. Scrum Essentials Cards: Experiences of Scrum Teams Improving with Essence

Volume 18, Issue 2

5 -- 18Jessie Frazelle. Power to the People
19 -- 24George V. Neville-Neil. Broken Hearts and Coffee Mugs
25 -- 46Terence Kelly. Is Persistent Memory Persistent?
47 -- 66Charisma Chan, Beth Cooper. Debugging Incidents in Google's Distributed Systems
67 -- 92Arvind Narayanan, Arunesh Mathur, Marshini Chetty, Mihir Kshirsagar. Dark Patterns: Past, Present, and Future

Volume 18, Issue 1

5 -- 15Jessie Frazelle. Chipping Away at Moore's Law
16 -- 24Pat Helland. The Best Place to Build a Subway
25 -- 32Thomas A. Limoncelli. Communicate Using the Numbers 1, 2, 3, and More
33 -- 36George V. Neville-Neil. Kode Vicious Plays in Traffic
37 -- 38Adrian M. Colyer. How Do Committees Invent? and Ironies of Automation
39 -- 60Jeremy Clark, Didem Demirag, Seyedehmahsa Moosavi. Demystifying Stablecoins
61 -- 79Robert O'Callahan, Kyle Huey, Devon H. O'Dell, Terry Coatta. To Catch a Failure: The Record-and-Replay Approach to Debugging