Journal: ACM Queue

Volume 20, Issue 6

4 -- 8George V. Neville-Neil. All Sliders to the Right: Hardware Overkill
9 -- 34Gabriel Falcão 0001, João Dinis Ferreira. To PiM or Not to PiM: The case for in-memory inferencing of quantized CNNs at the edge
35 -- 57Christian Bird, Denae Ford, Thomas Zimmermann 0001, Nicole Forsgren, Eirini Kalliamvakou, Travis Lowdermilk, Idan Gazit. Taking Flight with Copilot: Early insights and opportunities of AI-powered pair-programming tools
58 -- 79Guenever Aldrich, Danny Tsang, Jason McKenney. Three-part Harmony for Program Managers Who Just Don't Get It, Yet: Open-source software, open standards, and agile software development
80 -- 87Stefan Nagy, Peter Alvaro. The Fun in Fuzzing: The debugging technique comes into its own

Volume 20, Issue 5

5 -- 13Thomas A. Limoncelli. Split Your Overwhelmed Teams: Two Teams of Five is Not the Same as One Team of Ten
14 -- 19George V. Neville-Neil. The Elephant in the Room: It's time to get the POSIX elephant off our necks
20 -- 32Terence Kelly. Literate Executables
33 -- 57Peter Ward, Paul Wankadia, Kavita Guliani. Reinventing Backend Subsetting at Google: Designing an algorithm with reduced connection churn that could replace deterministic subsetting
58 -- 85Jorge A. Navas, Ashish Gehani. OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-program Specialization: Leveraging scalable pointer analysis, value analysis, and dynamic analysis
86 -- 102Maya Kaczorowski, Falcon Momot, George V. Neville-Neil, Chris McCubbin. OSS Supply-chain Security: What Will It Take?

Volume 20, Issue 4

5 -- 10Poul-Henning Kamp. CSRB's Opus One: Comments on the Cyber Safety Review Board Log4j Event Report
11 -- 15George V. Neville-Neil. The Four Horsemen of an Ailing Software Project: Don't let the pale rider catch you with an exception
16 -- 38Raphael Auer, Rainer Böhme, Jeremy Clark, Didem Demirag. Mapping the Privacy Landscape for Central Bank Digital Currencies: Now is the time to shape what future payment flows will reveal about you
39 -- 60Mache Creeger. The Rise of Fully Homomorphic Encryption: Often called the Holy Grail of cryptography, commercial FHE is near
61 -- 79Michael Loftus, Andrew Vezina, Rick Doten, Atefeh Mashatan. The Arrival of Zero Trust: What Does it Mean?
80 -- 106Matthew Bush, Atefeh Mashatan. From Zero to One Hundred: Demystifying zero trust and its implications on enterprise people, process, and technology
107 -- 115Ram Alagappan, Peter Alvaro. Crash Consistency: Keeping data safe in the presence of crashes is a fundamental problem

Volume 20, Issue 3

5 -- 13Pat Helland. I'm Probably Less Deterministic Than I Used to Be: Embracing randomness is necessary in cloud environments
14 -- 17George V. Neville-Neil. Securing the Company Jewels: GitHub and runbook security
18 -- 40James P. Hughes 0001, Whitfield Diffie. The Challenges of IoT, TLS, and Random Number Generators in the Real World: Bad random numbers are still with us and are proliferating in modern systems
41 -- 87Sutapa Mondal, Mangesh S. Gharote, Sachin Premsukh Lodha. Privacy of Personal Information: Going incog in a goldfish bowl
88 -- 95Martin Kleppmann, Peter Alvaro. Covergence: Research for Practice reboot

Volume 20, Issue 2

5 -- 10Poul-Henning Kamp. Linear Address Spaces: Unsafe at any speed
11 -- 15George V. Neville-Neil. When Should a Black Box Be Transparent?: When is a replacement not a replacement?
16 -- 30Terence Kelly. Persistent Memory Allocation: Leverage to move a world of software
31 -- 42Benoit Baudry, Tim Toady, Martin Monperrus. Long Live Software Easter Eggs!: They are as old as software
43 -- 66Jenna L. Butler, Catherine Yeh. Walk a Mile in Their Shoes: The Covid pandemic through the lens of four tech workers
67 -- 88James Agnew, Pat Helland, Adam Cole. FHIR: Reducing Friction in the Exchange of Healthcare Data: A discussion with James Agnew, Pat Helland, and Adam Cole

Volume 20, Issue 1

4 -- 9George V. Neville-Neil. The Planning and Care of Data: Rearranging buckets for no good reason
10 -- 23Alexandros Gazis, Eleftheria Katsiri. Middleware 101: What to know now and for the future
24 -- 39Archie L. Cobbs. Persistence Programming: Are we doing this right?
40 -- 79Brian Eaton, Jeff Sterart, Jon Tedesco, N. Cihan Tas. Distributed Latency Profiling through Critical Path Tracing: CPT can provide actionable and precise latency analysis
80 -- 104Pat Helland. Autonomous Computing: We frequently compute across autonomous boundaries but the implications of the patterns to ensure independence are rarely discussed