Contention for caches, memory controllers, and interconnects can be eased by contention-aware scheduling algorithms.Alexandra Fedorova, Sergey Blagodurov, Sergey Zhuravlev From Communications of the ACM | February 2010
Power-manageable hardware can help save energy, but what can software developers do to address the problem?Eric Saxe From Communications of the ACM | February 2010
As hard-drive capacities continue to outpace their throughput, the time has come for a new level of RAID.
Adam Leventhal From Communications of the ACM | January 2010
How do we develop software to make the most of the promise that asymmetric multicore systems use a lot less energy?Alexandra Fedorova, Juan Carlos Saez, Daniel Shelepov, Manuel Prieto From Communications of the ACM | December 2009
An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo From Communications of the ACM | December 2009
Participatory sensing technologies could improve our lives and our communities, but at what cost to our privacy?Katie Shilton From Communications of the ACM | November 2009
Stanford professor Pat Hanrahan sits down with the noted hedge fund founder, computational biochemist, and (above all) computer scientist.CACM Staff From Communications of the ACM | October 2009
GPU acceleration and other computer performance increases will offer critical benefits to biomedical science.James C. Phillips, John E. Stone From Communications of the ACM | October 2009
All revision-control systems come with complicated sets of trade-offs. How do you find the best match between tool and team?Bryan O'Sullivan From Communications of the ACM | September 2009
MonALISA developers describe how it works, the key design principles behind it, and the biggest technical challenges in building it.
Iosif Legrand, Ramiro Voicu, Catalin Cirstoiu, Costin Grigoras, Latchezar Betev, Alexandru Costan From Communications of the ACM | September 2009
The age of cloud computing has begun. How can companies take advantage of the new opportunities it provides?
Mache Creeger From Communications of the ACM | August 2009
The laws of physics and the Internet's routing infrastructure affect performance in a big way.Jonathan M. Smith From Communications of the ACM | July 2009
The pervasive and long-lasting sockets API has remained largely unchanged since 1982. How have developers worked around its inherent limitations and what is the...George V. Neville-Neil From Communications of the ACM | June 2009
The history of NFE processors sheds light on the trade-offs involved in designing network stack software.Mike O'Dell From Communications of the ACM | June 2009
New drive technologies and increased capacities create new categories of failure modes that will influence system designs.
Jon Elerath From Communications of the ACM | June 2009
Given the Internet's bottlenecks, how can we build fast, scalable, content-delivery systems?Tom Leighton From Communications of the ACM | February 2009
The sometimes contentious development of 64-bit systems shows how technology decisions can have unexpected, enduring consequences.John Mashey From Communications of the ACM | January 2009