Better understanding of data requires tracking its history and context.
LUCIAN CARATA, SHERIF AKOUSH, NIKILESH BALAKRISHNAN, THOMAS BYTHEWAY, RIPDUMAN SOHAN, MARGO SELTZER, ANDY HOPPER
Assessing the quality or validity of a piece of data is not usually done in isolation. You typically examine the context in which the data appears and try to determine its original sources or review the process through which it was created. This is not so straightforward when dealing with digital data, however: the result of a computation might have been derived from numerous sources and by applying complex successive transformations, possibly over long periods of time.
> A Primer on Provenance
Provenance in Sensor Data Management
CTO Roundtable: Storage
Better Scripts, Better Games
Decoupled from IP, TCP is at last able to support multihomed hosts.
CHRISTOPH PAASCH AND OLIVIER BONAVENTURE, UCL
The Internet relies heavily on two protocols. In the network layer, IP (Internet Protocol) provides an unreliable datagram service and ensures that any host can exchange packets with any other host. Since its creation in the 1970s, IP has seen the addition of several features, including multicast, IPsec (IP security), and QoS (quality of service). The latest revision, IPv6 (IP version 6), supports 16-byte addresses.
> Multipath TCP
Passively Measuring TCP Round-trip Times
You Don’t Know Jack about Network Performance
TCP Offload to the Rescue
Becoming better, faster, cheaper, and happier
IVAR JACOBSON, PAN-WEI NG, IAN SPENCE, AND PAUL E. MCMAHON
In today’s ever more competitive world, boards of directors and executives demand that CIOs and their teams deliver “more with less.” Studies show, without any real surprise, that there is no one-size-fits-all method to suit all software initiatives, and that a practice-based approach with some light but effective degree of order and governance is the goal of most software-development departments.
> Major-league SEMAT—Why Should an Executive Care?
The Essence of Software Engineering: The SEMAT Kernel
A Conversation with Steve Bourne, Eric Allman, and Bryan Cantrill
Voyage in the Agile Memeplex
> Eventually Consistent: Not What You Were Expecting?
Wojciech Golab, Muntasir R. Rahman, Alvin AuYoung, Kimberly Keeton, Xiaozhou (Steve) Li
Methods of quantifying consistency (or lack thereof) in eventually consistent storage systems
Eventual Consistency Today: Limitations, Extensions, and Beyond
BASE: An Acid Alternative
> Scaling Existing Lock-based Applications with Lock Elision
Lock elision enables existing lock-based programs to achieve the performance benefits of nonblocking synchronization and fine-grain locking with minor software engineering effort.
Proving the Correctness of Nonblocking Data Structures
Erlang for Concurrent Programming
Trials and Tribulations of Debugging Concurrency
A discussion with Kiran Prasad, Kelly Norton, and Terry Coatta
> Case Study: Node at LinkedIn: The Pursuit of Thinner, Lighter, Faster
Reveling in Constraints
Multitier Programming in Hop
High Performance Web Sites
What if all the software layers in a virtual appliance were compiled within the same safe, high-level language framework?
ANIL MADHAVAPEDDY AND DAVID J. SCOTT
Cloud computing has been pioneering the business of renting computing resources in large data centers to multiple (and possibly competing) tenants. The basic enabling technology for the cloud isoperating-system virtualization such as Xen1 or VMWare, which allows customers to multiplex VMs (virtual machines) on a shared cluster of physical machines. Each VM presents as a self-containedcomputer, booting a standard operating-system kernel and running unmodified applications just as if it were executing on a physical machine.
> Unikernels: Rise of the Virtual Library Operating System
Self-Healing in Modern Operating Systems
Erlang for Concurrent Programming
Passing a Language through the Eye of a Needle