Latest Practice
From Communications of the ACM
Use states to drive your tests.
Arie van Deursen From Communications of the ACM | August 2015
From Communications of the ACM
Cloud computing for computer scientists.
Daniel C. Wang From Communications of the ACM | August 2015
From Communications of the ACM
The finance industry has unique demands for low-latency distributed systems.
Andrew Brook From Communications of the ACM | July 2015
From Communications of the ACM
Lessons learned managing a data science research team.
Kate Matsudaira From Communications of the ACM | June 2015
From Communications of the ACM
In the end, dynamic systems are simply less secure.
Paul Vixie From Communications of the ACM | April 2015
From Communications of the ACM
The perpetual motion of parallel performance.
Neil J. Gunther, Paul Puglia, Kristofer Tomasette From Communications of the ACM | April 2015
From Communications of the ACM
Bad protocol, bad politics.
Poul-Henning Kamp From Communications of the ACM | March 2015
From Communications of the ACM
Crackers discover how to use NTP as a weapon for abuse.
Harlan Stenn From Communications of the ACM | February 2015
From Communications of the ACM
MBT has positive effects on efficiency and effectiveness, even if it only partially fulfills high expectations.
Robert V. Binder, Bruno Legeard, Anne Kramer From Communications of the ACM | February 2015
From Communications of the ACM
Designing locking primitives with performance in mind.
Davidlohr Bueso From Communications of the ACM | January 2015
From Communications of the ACM
Use the database built for your access model.
Rick Richardson From Communications of the ACM | January 2015
From Communications of the ACM
And the belief in such a device is harmful.
David Chisnall From Communications of the ACM | December 2014
From Communications of the ACM
What happened to the promise of rigorous, disciplined, professional practices for software development?
Ivar Jacobson, Ed Seidewitz From Communications of the ACM | December 2014
From Communications of the ACM
Public, verifiable, append-only logs.
Ben Laurie From Communications of the ACM | October 2014
From Communications of the ACM
Assessing legal and technical solutions to secure HTTPS.
Axel Arnbak, Hadi Asghari, Michel Van Eeten, Nico Van Eijk From Communications of the ACM | October 2014
From Communications of the ACM
Routing security incidents can still slip past deployed security defenses.
Sharon Goldberg From Communications of the ACM | October 2014
From Communications of the ACM
Quality social science research and the privacy of human subjects require trust.
Jon P. Daries, Justin Reich, Jim Waldo, Elise M. Young, Jonathan Whittinghill, Andrew Dean Ho, Daniel Thomas Seaton, Isaac Chuang From Communications of the ACM | September 2014
From Communications of the ACM
An informal survey of real-world communications failures.
Peter Bailis, Kyle Kingsbury From Communications of the ACM | September 2014
From Communications of the ACM
Preventing script injection vulnerabilities through software design.
Christoph Kern From Communications of the ACM | September 2014
From Communications of the ACM
Many disparate use cases can be satisfied with a single storage system.
Mark Cavage, David Pacheco From Communications of the ACM | August 2014