Networks without effective AQM may again be vulnerable to congestion collapse.Jim Gettys, Kathleen Nichols From Communications of the ACM | January 2012
Astronomers are collecting more data than ever. What practices can keep them ahead of the flood?G. Bruce Berriman, Steven L. Groom From Communications of the ACM | December 2011
Applying lessons from software languages to hardware languages using Bluespec SystemVerilog.Rishiyur S. Nikhil From Communications of the ACM | October 2011
In 1981, Jon Postel formulated the Robustness Principle. Although described for implementations of TCP, it was quickly accepted as a...Eric Allman From Communications of the ACM | August 2011
How the embeddability of Lua impacted its design.Roberto Ierusalimschy, Luiz Henrique De Figueiredo, Waldemar Celes From Communications of the ACM | July 2011
In today's humongous database systems, clarity may be relaxed, but business needs can still be met.
Pat Helland From Communications of the ACM | June 2011
Methods for evaluating and effectively managing the security behavior of employees.Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling From Communications of the ACM | June 2011
Contrary to popular belief, SQL and noSQL are really just two sides of the same coin.Erik Meijer, Gavin Bierman From Communications of the ACM | April 2011
Exposing SIMD units within interpreted languages could simplify programs and unleash floods of untapped processor power.
Jonathan Parri, Daniel Shapiro, Miodrag Bolic, Voicu Groza From Communications of the ACM | April 2011
Despite the global and borderless nature of the Internet's underlying protocols and driving philosophy, there are significant ways in which it remains substantively...Ross Stapleton-Gray, William Woodcock From Communications of the ACM | March 2011