Latest Practice
From Communications of the ACM
Reliability in the face of rapid change
Ben Maurer From Communications of the ACM | November 2015
From Communications of the ACM
Rethinking the fundamental abstractions of the file system.
T. S. Pillai, V. Chidambaram, R. Alagappan, S. Al-Kiswany, A. C. Arpaci-Dusseau, R. H. Arpaci-Dusseau From Communications of the ACM | October 2015
From Communications of the ACM
Cloud computing for computer scientists.
Daniel C. Wang From Communications of the ACM | August 2015
From Communications of the ACM
The finance industry has unique demands for low-latency distributed systems.
Andrew Brook From Communications of the ACM | July 2015
From Communications of the ACM
In the end, dynamic systems are simply less secure.
Paul Vixie From Communications of the ACM | April 2015
From Communications of the ACM
The perpetual motion of parallel performance.
Neil J. Gunther, Paul Puglia, Kristofer Tomasette From Communications of the ACM | April 2015
From Communications of the ACM
Bad protocol, bad politics.
Poul-Henning Kamp From Communications of the ACM | March 2015
From Communications of the ACM
Crackers discover how to use NTP as a weapon for abuse.
Harlan Stenn From Communications of the ACM | February 2015
From Communications of the ACM
MBT has positive effects on efficiency and effectiveness, even if it only partially fulfills high expectations.
Robert V. Binder, Bruno Legeard, Anne Kramer From Communications of the ACM | February 2015
From Communications of the ACM
Designing locking primitives with performance in mind.
Davidlohr Bueso From Communications of the ACM | January 2015
From Communications of the ACM
And the belief in such a device is harmful.
David Chisnall From Communications of the ACM | December 2014
From Communications of the ACM
Public, verifiable, append-only logs.
Ben Laurie From Communications of the ACM | October 2014
From Communications of the ACM
Routing security incidents can still slip past deployed security defenses.
Sharon Goldberg From Communications of the ACM | October 2014
From Communications of the ACM
An informal survey of real-world communications failures.
Peter Bailis, Kyle Kingsbury From Communications of the ACM | September 2014
From Communications of the ACM
Preventing script injection vulnerabilities through software design.
Christoph Kern From Communications of the ACM | September 2014
From Communications of the ACM
Many disparate use cases can be satisfied with a single storage system.
Mark Cavage, David Pacheco From Communications of the ACM | August 2014
From Communications of the ACM
Addressing the needs of professional software development.
Michael J. Lutz, J. Fernando Naveda, James R. Vallino From Communications of the ACM | August 2014
From Communications of the ACM
Stronger properties for low-latency geo-replicated storage.
Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen From Communications of the ACM | May 2014
From Communications of the ACM
The edge of the Internet is an unruly place.
Paul Vixie From Communications of the ACM | April 2014
From Communications of the ACM
Decoupled from IP, TCP is at last able to support multihomed hosts.
Christoph Paasch, Olivier Bonaventure From Communications of the ACM | April 2014