Journal: ACM Queue

Volume 21, Issue 6

5 -- 11Thomas A. Limoncelli. What do Trains, Horses, and Home Internet Installation have in Common?: Avoid changes mid-process
12 -- 15George V. Neville-Neil. Is There Another System?: Computer science is the study of what can be automated
16 -- 26Terence Kelly. Programmer Job Interviews: The Hidden Agenda
27 -- 46David Chisnall. How to Design an ISA: The popularity of RISC-V has led many to try designing instruction sets
47 -- 77Nicole Forsgren, Eirini Kalliamvakou, Abi Noda, Michaela Greiler, Brian Houck, Margaret-Anne D. Storey. DevEx in Action: A study of its tangible impacts
78 -- 100Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, Atefeh Mashatan. Multiparty Computation: To Secure Privacy, Do the Math: A discussion with Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, and Atefeh Mashatan
101 -- 127Divyansh Kaushik, Zachary C. Lipton, Alex John London. Resolving the Human-subjects Status of Machine Learning's Crowdworkers: What ethical framework should govern the interaction of ML researchers and crowdworkers?
128 -- 135Peter Alvaro, Manuel Rigger. Automatically Testing Database Systems: DBMS testing with test oracles, transaction history, and fuzzing

Volume 21, Issue 5

5 -- 12Kate Matsudaira. Software Managers' Guide to Operational Excellence: The secret to being a great engineering leader? Setting up the right checks and balances
13 -- 21Phil Vachon. The Security Jawbreaker: Access to a system should not imply authority to use it. Enter the principle of complete mediation
22 -- 28George V. Neville-Neil. Dear Diary: On keeping a laboratory notebook
29 -- 53Geoffrey H. Cooper. Device Onboarding using FDO and the Untrusted Installer Model: FDO's untrusted model is contrasted with Wi-Fi Easy Connect to illustrate the advantages of each mechanism
54 -- 65Harsh Deokuliar, Raghvinder S. Sangwan, Youakim Badr, Satish Mahadevan Srinivasan. Improving Testing of Deep-learning Systems: A combination of differential and mutation testing results in better test data
66 -- 86Ivar Jacobson, Alistair Cockburn. Use Cases are Essential: Use cases provide a proven method to capture and explain the requirements of a system in a concise and easily understood format
87 -- 107João Varajão, António Trigo, Miguel Almeida. Low-code Development Productivity: "Is winter coming" for code-based technologies?

Volume 21, Issue 4

5 -- 17Thomas A. Limoncelli. Knowing What You Neeed to Know: Personal, team, and organizational effectiveness can be improved with a little preparation
18 -- 22George V. Neville-Neil. Halfway Around the World: Learn the language, meet the people, eat the food
23 -- 43Terence Kelly. Protecting Secrets from Computers
44 -- 48Mark Russinovich. Confidential Computing: Elevating Cloud Security and Privacy: Working toward a more secure and innovative future
49 -- 67David Kaplan. Hardware VM Isolation in the Cloud: Enabling confidential computing with AMD SEV-SNP technology
68 -- 93Gobikrishna Dhanuskodi, Sudeshna Guha, Vidhya Krishnan, Aruna Manjunatha, Michael O'Connor, Rob Nertney, Phil Rogers. Creating the First Confidential GPUs: The team at NVIDIA brings confidentiality and integrity to user code and data for accelerated computing
94 -- 122Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich. Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy

Volume 21, Issue 3

5 -- 16Kate Matsudaira. Managing Hybrid Teams: The combination of on-site and remote workers takes extra effort from team leaders
17 -- 22Poul-Henning Kamp. Don't "Think of the Internet!": No human right is absolute
23 -- 28Phil Vachon. Security Mismatch: Security must be a business enabler, not a hinderer
29 -- 35George V. Neville-Neil. Stone Knives and Bear Skins
36 -- 53Alvaro Videla. Echoes of Intelligence: Textual interpretation and large language models
54 -- 64Samuel W. Stark, A. Theodore Markettos, Simon W. Moore. How Flexible is CXL's Memory Protection?: Replacing a sledgehammer with a scalpel
75 -- 93Ethan L. Miller, Achilles Benetopoulos, George V. Neville-Neil, Pankaj Mehra, Daniel Bittman. Pointers in Far Memory: A rethink of how data and computations should be organized

Volume 21, Issue 2

9 -- 13George V. Neville-Neil. The Human Touch: There is no substitute for good, direct, honest training
10 -- 13Thomas A. Limoncelli. Improvement on End-to-End Encryption May Lead to Silent Revolution: Researchers are on a brink of what could be the next big improvement in communication privacy
14 -- 34Amanda Casari, Julia Ferraioli, Juniper Lovato. Beyond the Repository: Best practices for open source ecosystems researchers
35 -- 53Abi Noda, Margaret-Anne D. Storey, Nicole Forsgren, Michaela Greiler. DevEx: What Actually Drives Productivity: The developer-centric approach to measuring and improving productivity
54 -- 65David Collier-Brown. You Don't know Jack about Application Performance: Knowing whether you're doomed to fail is important when starting a project
66 -- 87Edlyn V. Levine. Cargo Cult AI: Is the ability to think scientifically the defining essence of intelligence?
88 -- 95Kostis Kaffes, Peter Alvaro. OS Scheduling: Better scheduling policies for modern computing systems

Volume 21, Issue 1

5 -- 11George V. Neville-Neil. The Parchment Path?: Is there ever a time when learning is not of value - for its own sake?
12 -- 30Terence Kelly, Yekai Pan. Catch-23: The New C Standard Sets the World on Fire
30 -- 56Kelly Shortridge, Josiah Dykstra. Opportunity Cost and Missed Chances in Optimizing Cybersecurity: The loss of potential gain from other alternatives when one alternative is chosen
30 -- 56Simson L. Garfinkel, Jon Stewart 0001. Sharpening Your Tools: Updating bulk_extractor for the 2020s
85 -- 101Zachary Tellman. Designing a Framework for Conversational Interfaces: Combining the latest advances in machine learning with earlier approaches
102 -- 129Alfred Z. Spector, Peter Norvig, Chris Wiggins 0001, Jeannette M. Wing, Ben Fried, Michael Tingley. More Than Just Algorithms: A discussion with Alfred Spector, Peter Norvig, Chris Wiggins, Jeannette Wing, Ben Fried, and Michael Tingley