An essential technique used in emulator development is a useful addition to any programmer's toolbox.Peter Phillips From Communications of the ACM | May 2010
Clearing the clouds away from the true potential and obstacles posed by this computing capability.Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia From Communications of the ACM | April 2010
To succeed on a global scale, businesses should focus on a trio of key elements.
Siew Kien Sia, Christina Soh, Peter Weill From Communications of the ACM | March 2010
Kirk McKusick and Sean Quinlan discuss the origin and evolution of the Google File System.
Kirk McKusick, Sean Quinlan From Communications of the ACM | March 2010
A translator framework enables the use of model checking in complex avionics systems and other industrial settings.Steven P. Miller, Michael W. Whalen, Darren D. Cofer From Communications of the ACM | February 2010
Contention for caches, memory controllers, and interconnects can be eased by contention-aware scheduling algorithms.Alexandra Fedorova, Sergey Blagodurov, Sergey Zhuravlev From Communications of the ACM | February 2010
Power-manageable hardware can help save energy, but what can software developers do to address the problem?Eric Saxe From Communications of the ACM | February 2010
As hard-drive capacities continue to outpace their throughput, the time has come for a new level of RAID.
Adam Leventhal From Communications of the ACM | January 2010
Companies have access to more types of external data than ever before. How can they integrate it most effectively?Stephen Petschulat From Communications of the ACM | January 2010
How do we develop software to make the most of the promise that asymmetric multicore systems use a lot less energy?Alexandra Fedorova, Juan Carlos Saez, Daniel Shelepov, Manuel Prieto From Communications of the ACM | December 2009
Long considered an afterthought, software maintenance is easiest and most effective when built into a system from the ground up.Paul Stachour, David Collier-Brown From Communications of the ACM | November 2009
Participatory sensing technologies could improve our lives and our communities, but at what cost to our privacy?Katie Shilton From Communications of the ACM | November 2009
As the sophistication of wiretapping technology grows, so too do the risks it poses to our privacy and security.Whitfield Diffie, Susan Landau From Communications of the ACM | November 2009
GPU acceleration and other computer performance increases will offer critical benefits to biomedical science.James C. Phillips, John E. Stone From Communications of the ACM | October 2009
MonALISA developers describe how it works, the key design principles behind it, and the biggest technical challenges in building it.
Iosif Legrand, Ramiro Voicu, Catalin Cirstoiu, Costin Grigoras, Latchezar Betev, Alexandru Costan From Communications of the ACM | September 2009