Decoupled from IP, TCP is at last able to support multihomed hosts.
CHRISTOPH PAASCH AND OLIVIER BONAVENTURE, UCL
The Internet relies heavily on two protocols. In the network layer, IP (Internet Protocol) provides an unreliable datagram service and ensures that any host can exchange packets with any other host. Since its creation in the 1970s, IP has seen the addition of several features, including multicast, IPsec (IP security), and QoS (quality of service). The latest revision, IPv6 (IP version 6), supports 16-byte addresses.
> Multipath TCP
Passively Measuring TCP Round-trip Times
You Don’t Know Jack about Network Performance
TCP Offload to the Rescue
Becoming better, faster, cheaper, and happier
IVAR JACOBSON, PAN-WEI NG, IAN SPENCE, AND PAUL E. MCMAHON
In today’s ever more competitive world, boards of directors and executives demand that CIOs and their teams deliver “more with less.” Studies show, without any real surprise, that there is no one-size-fits-all method to suit all software initiatives, and that a practice-based approach with some light but effective degree of order and governance is the goal of most software-development departments.
> Major-league SEMAT—Why Should an Executive Care?
The Essence of Software Engineering: The SEMAT Kernel
A Conversation with Steve Bourne, Eric Allman, and Bryan Cantrill
Voyage in the Agile Memeplex
And the illogic of PDF
I work in a pretty open environment, and by open I mean that many people have the ability to become the root user on our servers so that they can fix things as they break. When the company started, there were only a few of us to do all the work, and people with different responsibilities had to jump in to help if a server died or a process got away from us. That was several years ago, but there are still many people who have rootly powers, some because of legacy and some because they are deemed too important to restrict. The problem is that one of these legacy users insists on doing almost everything as root and, in fact, uses the sudo command only to execute sudo su -. Every time I need to debug a system this person has worked on, I wind up on a two- to four-hour log-spelunking tour because he also does not take notes on what he has done, and when he’s finished he simply reports, “It’s fixed.” I think you will agree this is maddening behavior.
Routed by Root
> Eventually Consistent: Not What You Were Expecting?
Wojciech Golab, Muntasir R. Rahman, Alvin AuYoung, Kimberly Keeton, Xiaozhou (Steve) Li
Methods of quantifying consistency (or lack thereof) in eventually consistent storage systems
Eventual Consistency Today: Limitations, Extensions, and Beyond
BASE: An Acid Alternative
> Scaling Existing Lock-based Applications with Lock Elision
Lock elision enables existing lock-based programs to achieve the performance benefits of nonblocking synchronization and fine-grain locking with minor software engineering effort.
Proving the Correctness of Nonblocking Data Structures
Erlang for Concurrent Programming
Trials and Tribulations of Debugging Concurrency
A discussion with Kiran Prasad, Kelly Norton, and Terry Coatta
> Case Study: Node at LinkedIn: The Pursuit of Thinner, Lighter, Faster
Reveling in Constraints
Multitier Programming in Hop
High Performance Web Sites
The meaning of bits and avoiding upgrade bog downs
When will someone write documentation that tells you what the bits mean rather than what they set? I’ve been working to integrate a library into our system, and every time I try to figure out what it wants from my code, all it tells me is what a part of it is: “This is the foo field.” The problem is that it doesn’t tell me what happens when I set foo. It’s as if I’m supposed to know that already.
> This is the Foo Field