New: Check out the ACMQueue subreddit

New: Translations. ACM Q em Língua Portuguesa

Latest Queue Content     

Web Security


Web Security

Why Is It Taking So Long to Secure Internet Routing?

  Sharon Goldberg

Routing security incidents can still slip past deployed security defenses.


Related:
What DNS Is Not
The Network is Reliable
DNS Complexity by Paul Vixie



Certificate Transparency

  Ben Laurie

Public, verifiable, append-only logs


Related:
Network Forensics
The Case Against Data Lock-in
A Decade of OS Access-control Extensibility



Securing the Tangled Web

  Christoph Kern

Preventing script injection vulnerabilities through software design


Related:
Fault Injection in Production
High Performance Web Sites
Vicious XSS



Education


Education

Privacy, Anonymity, and Big Data
in the Social Sciences

  Jon P. Daries, Justin Reich, Jim Waldo, Elise M. Young, Jonathan Whittinghill, Daniel Thomas Seaton, Andrew Dean Ho, Isaac Chuang

Quality social science research and the privacy of human subjects requires trust.


Related:
Four Billion Little Brothers?: Privacy, mobile phones, and ubiquitous data collection
Communications Surveillance: Privacy and Security at Risk
Modeling People and Places with Internet Photo Collections



Undergraduate Software Engineering: Addressing the Needs of Professional Software Development

  Michael J. Lutz, J. Fernando Naveda, James R. Vallino

Addressing the Needs of Professional Software Development


Related:
Fun and Games: Multi-Language Development
Pride and Prejudice: (The Vasa)
A Conversation with John Hennessy and David Patterson



Networks


Networks

The Network is Reliable

  Peter Bailis, Kyle Kingsbury

An informal survey of real-world communications failures


Related:
Eventual Consistency Today: Limitations, Extensions, and Beyond
The Antifragile Organization
Self-Healing Networks


Multipath TCP

  Christoph Paasch, Olivier Bonaventure

Decoupled from IP, TCP is at last able to support multihomed hosts.


Related:
Passively Measuring TCP Round-trip Times
You Don't Know Jack about Network Performance
TCP Offload to the Rescue


Rate-limiting State

  Paul Vixie

The edge of the Internet is an unruly place


Related:
DNS Complexity
Broadcast Messaging: Messaging to the Masses
Lessons from the Letter



Data


Data

Bringing Arbitrary Compute to Authoritative Data

  Mark Cavage, David Pacheco

Many disparate use cases can be satisfied with a single storage system.


Related:
Cloud Computing: An Overview
A co-Relational Model of Data for Large Shared Data Banks
Condos and Clouds


Don't Settle for Eventual Consistency

  Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen

Stronger properties for low-latency geo-replicated storage


Related:
Proving the Correctness of Nonblocking Data Structures
Eventual Consistency Today: Limitations, Extensions, and Beyond
Structured Deferral: Synchronization via Procrastination


A Primer on Provenance

  Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, Margo Seltzer, Andy Hopper

Better understanding of data requires tracking its history and context.


Related:
Provenance in Sensor Data Management
CTO Roundtable: Storage
Better Scripts, Better Games



Columns: Cerf's Up


ACM and the Professional Programmer

  Vinton G. Cerf

How do you, the reader, stay informed about research that influences your work?



Columns: Kode Vicious


Outsourcing Responsibility

  George V. Neville-Neil

What do you do when your debugger fails you?



Columns: The Bikeshed


Quality Software Costs Money - Heartbleed Was Free

  Poul-Henning Kamp

How to generate funding for FOSS



Security


Who Must You Trust?

  Thomas Wadlow

Security

You must have some trust if you want to get anything done.


Related:
The Answer is 42 of Course
Weapons of Mass Assignment
LinkedIn Password Leak: Salt Their Hide

Finding More Than One Worm in the Apple

  Mike Bland

If you see something, say something.


Related:
Security is Harder than You Think
Nine IM Accounts and Counting
Browser Security Case Study

The NSA and Snowden: Securing the All-Seeing Eye

  Bob Toxen

How good security at the NSA could have stopped him


Related:
More Encryption Is Not the Solution
Four Billion Little Brothers?
Communications Surveillance: Privacy and Security at Risk


Case Study

Quality Assurance


Automated QA Testing at EA:
Driven by Events

A discussion with Michael Donat, Jafar Husain,
and Terry Coatta


Related:
Orchestrating an Automated Test Lab
Finding Usability Bugs with Automated Tests
Adopting DevOps Practices in Quality Assurance

Languages


Design Exploration through Code-generating DSLs

Languages

  Bo Joel Svensson, Mary Sheeran, Ryan Newton

High-level DSLs for low-level programming


Related:
Purpose-Built Languages
The Ideal HPC Programming Language
Creating Languages in Racket


Domain-specific Languages and Code Synthesis
Using Haskell

  Andy Gill

Looking at embedded DSLs


Related:
OCaml for the Masses
The World According to LINQ
DSL for the Uninitiated


The Curse of the Excluded Middle

  Erik Meijer

"Mostly functional" programming does not work


Related:
A Conversation with Erik Meijer and José Blakeley
Multitier Programming in Hop
FPGA Programming for the Masses



Development


Development

Major-league SEMAT—Why Should an Executive Care?

  Ivar Jacobson, Pan-Wei Ng, Ian Spence, Paul E. McMahon

Becoming better, faster, cheaper, and happier


Related:
The Essence of Software Engineering: The SEMAT Kernel
A Conversation with Steve Bourne, Eric Allman, and Bryan Cantrill
Voyage in the Agile Memeplex

The Software Inferno

  Alex E. Bell

Dante's tale, as experienced by a software architect


Related:
Death by UML Fever
Coding for the Code
Software Development with Code Maps



Videos

Upcoming
ACM Learning Webinars