Journal: ACM Queue

Volume 22, Issue 6

10 -- 0Terence Kelly, Ziheng Aaron Su. Retrofitting: Principles and Practice
20 -- 0Mark Russinovich, Ahmed Salem 0001, Santiago Zanella Béguelin, Yonatan Zunger. The Price of Intelligence: Three risks inherent in LLMs
30 -- 0George V. Neville-Neil. The Drunken Plagiarists: Working with Co-pilots
40 -- 0David R. Morrison. Simulation: An Underutilized Tool in Distributed Systems
50 -- 0Thomas A. Limoncelli. Give Engineers Problems, Not Solutions: A simple strategy to improve solutions and boost morale
60 -- 0Marc Brooker, Ankush Desai. Systems Correctness Practices at AWS: Leveraging Formal and Semi-formal Methods
70 -- 0Kate Matsudaira. My Career-limiting Communication: Be thoughtful about your content. You've got a lot riding on it
80 -- 0Achilles Benetopoulos. Intermediate Representations for the Datacenter Computer: Lowering the Burden of Robust and Performant Distributed Systems

Volume 22, Issue 5

10 -- 0Stacy M. Branham, Shahtab Wahid. It's Time to Make Software Accessible: Here's how, from OS to organization
20 -- 0Stacy M. Branham, Shahtab Wahid, Sheri Byrne-Haber, Jamal Mazrui, Carlos Muncharaz, Carl Myhill. The State of Digital Accessibility
30 -- 0Chris Fleizach, Jeffrey P. Bigham. System-class Accessibility: The architectural support for making a whole system usable by people with disabilities
40 -- 0Juanami Spencer. Accessibility Considerations for Mobile Applications: How the Bloomberg Connects app supports accessibility in the product and process
50 -- 0Shahtab Wahid. Design Systems Are Accessibility Delivery Vehicles: Making accessibility support for applications scalable, productive, and consistent
60 -- 0Vinnie Donati. Driving Organizational Accessibility: People often ask about the secret sauce behind Microsoft's approach to accessibility and inclusion. It's simple: We run it like a business
70 -- 0Sonja Johnson-Yu, Sanket Shah. You Don't Know Jack About AI: And ChatGPT probably doesn't either
80 -- 0Poul-Henning Kamp. Civics is Boring. So, Let's Encrypt Something!: IT professionals can either passively suffer political solutions or participate in the process to achieve something better
90 -- 0George V. Neville-Neil. Building on Shaky Ground: We owe it to the world to make systems work safely and reliably

Volume 22, Issue 4

10 -- 0Jim Waldo, Soline Boussard. GPTs and Hallucination: Why do large language models hallucinate?
20 -- 0Mark Russinovich, Cédric Fournet, Greg Zaverucha, Josh Benaloh, Brandon Murdoch, Manuel Costa. Confidential Computing Proofs: An alternative to cryptographic zero-knowledge
30 -- 0João Varajão, António Trigo. Assessing IT Project Success: Perception vs. Reality: We would not be in the digital age if it were not for the recurrent success of IT projects
40 -- 0Catherine Hayes, David Malone. Questioning the Criteria for Evaluating Non-cryptographic Hash Functions: Maybe we need to think more about non-cryptographic hash functions
50 -- 0Shuvendu K. Lahiri, Alexey Svyatkovskiy, Christian Bird, Erik Meijer 0001, Terry Coatta. Program Merge: What's Deep Learning Got to Do with It?: A discussion with Shuvendu Lahiri, Alexey Svyatkovskiy, Christian Bird, Erik Meijer and Terry Coatta
60 -- 0Peter Alvaro, Andrew Quinn. Deterministic Record-and-Replay: Zeroing in only on the nondeterministic actions of the process
70 -- 0George V. Neville-Neil. Unwanted Surprises: When that joke of an API is on you
80 -- 0Phil Vachon. Test Accounts: A Hidden Risk: You may decide the risks are acceptable. But, if not, here are some rules for avoiding them

Volume 22, Issue 3

10 -- 0Poul-Henning Kamp. The Expense of Unprotected Free Software: It's high time FOSS maintainers got a bit of appreciation
20 -- 0George V. Neville-Neil. Repeat, Reproduce, Replicate: The pressure to publish versus the will to defend scientific claims
30 -- 0Kate Matsudaira. Working Models for Tackling Tech Debt: Understand the options to tailor an approach that suits your needs
40 -- 0Qian Li 0027, Peter Kraft. Transactions and Serverless are Made for Each Other: If serverless platforms could wrap functions in database transactions, they would be a good fit for database-backed applications
50 -- 0David Collier-Brown. You Don't Know Jack about Bandwidth: If you're an ISP and all your customers hate you, take heart. This is now a solvable problem
60 -- 0Mansi Khemka, Brian Houck. Toward Effective AI Support for Developers: A survey of desires and concerns
70 -- 0Erik Meijer 0001. Virtual Machinations: Using Large Language Models as Neural Computers: LLMs can function not only as databases, but also as dynamic, end-user programmable neural computers

Volume 22, Issue 2

0 -- 0Charles Garcia-Tobin, Mark Knight. Elevating Security with Arm CCA: Attestation and verification are integral to adopting confidential computing
0 -- 0Thomas A. Limoncelli. Make Two Trips: Larry David's New Year's resolution works for IT too
0 -- 0Raluca Ada Popa. Confidential Computing or Cryptographic Computing?: Tradeoffs between cryptography and hardware enclaves
0 -- 0Matthew A. Johnson, Stavros Volos, Ken Gordon, Sean T. Allen, Christoph M. Wintersteiger, Sylvan Clebsch, John Starks, Manuel Costa. Confidential Container Groups: Implementing confidential computing on Azure container instances
0 -- 0Jinnan Guo, Peter R. Pietzuch, Andrew Paverd, Kapil Vaswani. Trustworthy AI using Confidential Federated Learning: Federated learning and confidential computing are not competing technologies
0 -- 0George V. Neville-Neil. Structuring Success: The problem with software structure is people don't really learn it until they really need it
0 -- 0Terence Kelly. Zero Tolerance for Bias

Volume 22, Issue 1

5 -- 9Kate Matsudaira. Give Your Project a Name: It goes a long way toward creating a cohesive team with strong morale
10 -- 16Poul-Henning Kamp. Free and Open Source Software - and Other Market Failures: Open source is not a goal as much as a means to an end
17 -- 22George V. Neville-Neil. Software Drift: Open source forking
23 -- 47Queenie Luo, Michael J. Puett, Michael D. Smith 0001. A "Perspectival" Mirror of the Elephant: Investigating language bias on Google, ChatGPT, YouTube, and Wikipedia
48 -- 72Padmal Vitharana, Shahir A. Daya. Challenges in Adopting and Sustaining Microservice-based Software Development: Organizational challenges can be more difficult than technical ones
73 -- 99Christoph Kern. Developer Ecosystems for Software Safety: Continuous assurance at scale
100 -- 113Yifei Wang. From Open Access to Guarded Trust: Experimenting responsibly in the age of data privacy