Despite the global and borderless nature of the Internet's underlying protocols and driving philosophy, there are significant ways in which it remains substantively...Ross Stapleton-Gray, William Woodcock From Communications of the ACM | March 2011
Clem Cole and Russell Williams discuss Photoshop's long history with parallelism, and what is now seen as the chief challenge.ACM Case Study From Communications of the ACM | October 2010
Improving the performance of complex software is difficult, but understanding some fundamental principles can make it easier.Cary Millsap From Communications of the ACM | September 2010
Clearing the clouds away from the true potential and obstacles posed by this computing capability.Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia From Communications of the ACM | April 2010
Contention for caches, memory controllers, and interconnects can be eased by contention-aware scheduling algorithms.Alexandra Fedorova, Sergey Blagodurov, Sergey Zhuravlev From Communications of the ACM | February 2010
Power-manageable hardware can help save energy, but what can software developers do to address the problem?Eric Saxe From Communications of the ACM | February 2010
As hard-drive capacities continue to outpace their throughput, the time has come for a new level of RAID.
Adam Leventhal From Communications of the ACM | January 2010
How do we develop software to make the most of the promise that asymmetric multicore systems use a lot less energy?Alexandra Fedorova, Juan Carlos Saez, Daniel Shelepov, Manuel Prieto From Communications of the ACM | December 2009
An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo From Communications of the ACM | December 2009
Participatory sensing technologies could improve our lives and our communities, but at what cost to our privacy?Katie Shilton From Communications of the ACM | November 2009