|
1-10 of 35 reviews |
Date Reviewed | |
|
C is not a low-level language Chisnall D. Queue 16(2): 18-30, 2018. Type: Article
Early computers were programmed with low-level languages that were very close to their physical architecture. Although those languages guaranteed efficient use of machine resources, they were not particularly user-friendly, meaning it ...
|
Oct 21 2020 |
|
|
The calculus of service availability Sloss B., Dahlin M., Rau V., Beyer B. Queue 15(2): 49-67, 2017. Type: Article
The authors give a brief introduction to the service availability required by service-level objectives (SLOs) for availability and responsiveness. The article makes many references to Google’s Site reliability engineering:...
|
May 21 2020 |
|
|
Canary Analysis Service Davidovič Š., Beyer B. Queue 16(1): 35-57, 2018. Type: Article
Canary analysis is based on the age-old principle of bringing canaries into coal mines to detect possible air quality issues. Because canaries are more sensitive to pollution than humans, they serve as an early warning sign of possible...
|
Mar 5 2020 |
|
|
Data sketching Cormode G. Queue 15(2): 49-67, 2017. Type: Article
This lively article deals with the creation of datasets for testing as standalone projects separate from their underlying applications. The starting assumption is simple: as live data is generally not suitable for demos due to privacy ...
|
Feb 28 2020 |
|
|
Hack for hire Mirian A. Queue 17(4): 41-60, 2019. Type: Article
Email accounts usually include large amounts of sensitive information, including passwords for other accounts, financial information, contacts’ information, business exchanges, and so on. Consequently, they make a valuable ta...
|
Jan 29 2020 |
|
|
Understanding database reconstruction attacks on public data Garfinkel S., Abowd J., Martindale C. Queue 16(5): 28-53, 2018. Type: Article
I found this article on the US Census Bureau to be a fascinating tale of the history of the census, including attacks on it and methods that can be used to prevent the loss of personally identifying information (PII) stored there. The ...
|
Oct 7 2019 |
|
|
Access controls and health care records: Who owns the data? Evans D., McDonald R., Coatta T. Queue 17(2): 76-92, 2019. Type: Article
This is an interesting discussion with David Evans, Richard McDonald, and Terry Coatta. David Evans is the chief technology officer (CTO) of Toronto-based HealthChain, Richard McDonald is a recently retired IBM Distinguished Engineer, ...
|
Sep 20 2019 |
|
|
The importance of a great finish Matsudaira K. Queue 16(5): 5-11, 2018. Type: Article
The thesis of this article is “you have to finish strong, every time.” The author strongly emphasizes that the work at the end of a software development project is just as important (if not more so) than the work at...
|
Feb 27 2019 |
|
|
Bitcoin’s academic pedigree Narayanan A., Clark J. Queue 15(4): 1-30, 2017. Type: Article
In this highly readable article, the authors Arvind Narayanan and Jeremy Clark search for the academic origins of the concept behind Bitcoin and blockchain technology....
|
May 24 2018 |
|
|
Should you upload or ship big data to the cloud? Date S. Queue 14(2): 111-135, 2016. Type: Article
Sachin Date describes a problem that persists for many people who have limited access to a high-speed Internet connection....
|
Mar 9 2017 |
|
|
|
|
|
|
|
|